Show filters
40 Total Results
Displaying 11-20 of 40
Sort by:
Attacker Value
Unknown

CVE-2021-28090

Disclosure Date: March 19, 2021 (last updated November 08, 2023)
Tor before 0.4.5.7 allows a remote attacker to cause Tor directory authorities to exit with an assertion failure, aka TROVE-2021-002.
Attacker Value
Unknown

CVE-2020-15572

Disclosure Date: July 15, 2020 (last updated February 21, 2025)
Tor before 0.4.3.6 has an out-of-bounds memory access that allows a remote denial-of-service (crash) attack against Tor instances built to use Mozilla Network Security Services (NSS), aka TROVE-2020-001.
Attacker Value
Unknown

CVE-2020-10592

Disclosure Date: March 23, 2020 (last updated November 27, 2024)
Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (CPU consumption), aka TROVE-2020-002.
Attacker Value
Unknown

CVE-2020-10593

Disclosure Date: March 23, 2020 (last updated February 21, 2025)
Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (memory leak), aka TROVE-2020-004. This occurs in circpad_setup_machine_on_circ because a circuit-padding machine can be negotiated twice on the same circuit.
Attacker Value
Unknown

CVE-2020-8516

Disclosure Date: February 02, 2020 (last updated November 08, 2023)
The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability
Attacker Value
Unknown

CVE-2015-2928

Disclosure Date: January 24, 2020 (last updated November 28, 2024)
The Hidden Service (HS) server implementation in Tor before 0.2.4.27, 0.2.5.x before 0.2.5.12, and 0.2.6.x before 0.2.6.7 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors.
Attacker Value
Unknown

CVE-2015-2689

Disclosure Date: January 24, 2020 (last updated February 21, 2025)
Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle pending-connection resolve states during periods of high DNS load, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.
Attacker Value
Unknown

CVE-2015-2929

Disclosure Date: January 24, 2020 (last updated November 28, 2024)
The Hidden Service (HS) client implementation in Tor before 0.2.4.27, 0.2.5.x before 0.2.5.12, and 0.2.6.x before 0.2.6.7 allows remote servers to cause a denial of service (assertion failure and application exit) via a malformed HS descriptor.
Attacker Value
Unknown

CVE-2015-2688

Disclosure Date: January 24, 2020 (last updated February 21, 2025)
buf_pullup in Tor before 0.2.4.26 and 0.2.5.x before 0.2.5.11 does not properly handle unexpected arrival times of buffers with invalid layouts, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via crafted packets.
Attacker Value
Unknown

CVE-2019-13075

Disclosure Date: June 30, 2019 (last updated November 27, 2024)
Tor Browser through 8.5.3 has an information exposure vulnerability. It allows remote attackers to detect the browser's language via vectors involving an IFRAME element, because text in that language is included in the title attribute of a LINK element for a non-HTML page. This is related to a behavior of Firefox before 68.
0