Show filters
26 Total Results
Displaying 21-26 of 26
Sort by:
Attacker Value
Unknown

CVE-2011-0015

Disclosure Date: January 19, 2011 (last updated October 04, 2023)
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor.
0
Attacker Value
Unknown

CVE-2010-1676

Disclosure Date: December 22, 2010 (last updated October 04, 2023)
Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown

CVE-2010-0385

Disclosure Date: January 25, 2010 (last updated October 04, 2023)
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query.
0
Attacker Value
Unknown

CVE-2010-0383

Disclosure Date: January 25, 2010 (last updated October 04, 2023)
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations.
0
Attacker Value
Unknown

CVE-2009-0414

Disclosure Date: February 03, 2009 (last updated October 04, 2023)
Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption.
0
Attacker Value
Unknown

CVE-2007-4174

Disclosure Date: August 07, 2007 (last updated October 04, 2023)
Tor before 0.1.2.16, when ControlPort is enabled, does not properly restrict commands to localhost port 9051, which allows remote attackers to modify the torrc configuration file, compromise anonymity, and have other unspecified impact via HTTP POST data containing commands without valid authentication, as demonstrated by an HTML form (1) hosted on a web site or (2) injected by a Tor exit node.
0