Show filters
28 Total Results
Displaying 21-28 of 28
Sort by:
Attacker Value
Unknown

CVE-2011-0015

Disclosure Date: January 19, 2011 (last updated October 04, 2023)
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor.
0
Attacker Value
Unknown

CVE-2009-2426

Disclosure Date: July 10, 2009 (last updated October 04, 2023)
The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0.35 and 0.1.x before 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an internal IP address via unknown vectors. NOTE: some of these details are obtained from third party information.
0
Attacker Value
Unknown

CVE-2009-0938

Disclosure Date: March 18, 2009 (last updated October 04, 2023)
Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service (exit node crash) via "malformed input."
0
Attacker Value
Unknown

CVE-2009-0937

Disclosure Date: March 18, 2009 (last updated October 04, 2023)
Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service via unknown vectors.
0
Attacker Value
Unknown

CVE-2009-0939

Disclosure Date: March 18, 2009 (last updated October 04, 2023)
Tor before 0.2.0.34 treats incomplete IPv4 addresses as valid, which has unknown impact and attack vectors related to "Spec conformance," as demonstrated using 192.168.0.
0
Attacker Value
Unknown

CVE-2009-0936

Disclosure Date: March 18, 2009 (last updated October 04, 2023)
Unspecified vulnerability in Tor before 0.2.0.34 allows attackers to cause a denial of service (infinite loop) via "corrupt votes."
0
Attacker Value
Unknown

CVE-2009-0654

Disclosure Date: February 20, 2009 (last updated October 04, 2023)
Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router. NOTE: the vendor disputes the significance of this issue, noting that the product's design "accepted end-to-end correlation as an attack that is too expensive to solve."
0
Attacker Value
Unknown

CVE-2009-0414

Disclosure Date: February 03, 2009 (last updated October 04, 2023)
Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption.
0