Show filters
22 Total Results
Displaying 11-20 of 22
Sort by:
Attacker Value
Unknown
CVE-2011-0016
Disclosure Date: January 19, 2011 (last updated October 04, 2023)
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process.
0
Attacker Value
Unknown
CVE-2011-0491
Disclosure Date: January 19, 2011 (last updated October 04, 2023)
The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to "underflow errors."
0
Attacker Value
Unknown
CVE-2011-0427
Disclosure Date: January 19, 2011 (last updated October 04, 2023)
Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown
CVE-2011-0492
Disclosure Date: January 19, 2011 (last updated October 04, 2023)
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file.
0
Attacker Value
Unknown
CVE-2011-0015
Disclosure Date: January 19, 2011 (last updated October 04, 2023)
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor.
0
Attacker Value
Unknown
CVE-2009-2426
Disclosure Date: July 10, 2009 (last updated October 04, 2023)
The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0.35 and 0.1.x before 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an internal IP address via unknown vectors. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown
CVE-2009-0938
Disclosure Date: March 18, 2009 (last updated October 04, 2023)
Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service (exit node crash) via "malformed input."
0
Attacker Value
Unknown
CVE-2009-0937
Disclosure Date: March 18, 2009 (last updated October 04, 2023)
Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service via unknown vectors.
0
Attacker Value
Unknown
CVE-2009-0939
Disclosure Date: March 18, 2009 (last updated October 04, 2023)
Tor before 0.2.0.34 treats incomplete IPv4 addresses as valid, which has unknown impact and attack vectors related to "Spec conformance," as demonstrated using 192.168.0.
0
Attacker Value
Unknown
CVE-2009-0936
Disclosure Date: March 18, 2009 (last updated October 04, 2023)
Unspecified vulnerability in Tor before 0.2.0.34 allows attackers to cause a denial of service (infinite loop) via "corrupt votes."
0