Show filters
29 Total Results
Displaying 21-29 of 29
Sort by:
Attacker Value
Unknown
CVE-2011-0015
Disclosure Date: January 19, 2011 (last updated October 04, 2023)
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor.
0
Attacker Value
Unknown
CVE-2010-1676
Disclosure Date: December 22, 2010 (last updated October 04, 2023)
Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown
CVE-2010-0385
Disclosure Date: January 25, 2010 (last updated October 04, 2023)
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query.
0
Attacker Value
Unknown
CVE-2010-0383
Disclosure Date: January 25, 2010 (last updated October 04, 2023)
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations.
0
Attacker Value
Unknown
CVE-2009-2426
Disclosure Date: July 10, 2009 (last updated October 04, 2023)
The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0.35 and 0.1.x before 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an internal IP address via unknown vectors. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown
CVE-2009-0414
Disclosure Date: February 03, 2009 (last updated October 04, 2023)
Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption.
0
Attacker Value
Unknown
CVE-2008-5398
Disclosure Date: December 09, 2008 (last updated October 04, 2023)
Tor before 0.2.0.32 does not properly process the ClientDNSRejectInternalAddresses configuration option in situations where an exit relay issues a policy-based refusal of a stream, which allows remote exit relays to have an unknown impact by mapping an internal IP address to the destination hostname of a refused stream.
0
Attacker Value
Unknown
CVE-2008-5397
Disclosure Date: December 09, 2008 (last updated October 04, 2023)
Tor before 0.2.0.32 does not properly process the (1) User and (2) Group configuration options, which might allow local users to gain privileges by leveraging unintended supplementary group memberships of the Tor process.
0
Attacker Value
Unknown
CVE-2006-4508
Disclosure Date: August 31, 2006 (last updated October 04, 2023)
Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service (flood) via unspecified vectors.
0