Show filters
40 Total Results
Displaying 21-30 of 40
Sort by:
Attacker Value
Unknown

CVE-2019-12383

Disclosure Date: May 28, 2019 (last updated November 27, 2024)
Tor Browser before 8.0.1 has an information exposure vulnerability. It allows remote attackers to detect the browser's UI locale by measuring a button width, even if the user has a "Don't send my language" setting.
Attacker Value
Unknown

CVE-2019-8955

Disclosure Date: February 21, 2019 (last updated November 27, 2024)
In Tor before 0.3.3.12, 0.3.4.x before 0.3.4.11, 0.3.5.x before 0.3.5.8, and 0.4.x before 0.4.0.2-alpha, remote denial of service against Tor clients and relays can occur via memory exhaustion in the KIST cell scheduler.
0
Attacker Value
Unknown

CVE-2017-16639

Disclosure Date: September 14, 2018 (last updated November 27, 2024)
Tor Browser on Windows before 8.0 allows remote attackers to bypass the intended anonymity feature and discover a client IP address, a different vulnerability than CVE-2017-16541. User interaction is required to trigger this vulnerability.
0
Attacker Value
Unknown

CVE-2018-16983

Disclosure Date: September 13, 2018 (last updated November 27, 2024)
NoScript Classic before 5.1.8.7, as used in Tor Browser 7.x and other products, allows attackers to bypass script blocking via the text/html;/json Content-Type value.
0
Attacker Value
Unknown

CVE-2018-0491

Disclosure Date: March 05, 2018 (last updated November 26, 2024)
A use-after-free issue was discovered in Tor 0.3.2.x before 0.3.2.10. It allows remote attackers to cause a denial of service (relay crash) because the KIST implementation allows a channel to be added more than once in the pending list.
0
Attacker Value
Unknown

CVE-2018-0490

Disclosure Date: March 05, 2018 (last updated November 26, 2024)
An issue was discovered in Tor before 0.2.9.15, 0.3.1.x before 0.3.1.10, and 0.3.2.x before 0.3.2.10. The directory-authority protocol-list subprotocol implementation allows remote attackers to cause a denial of service (NULL pointer dereference and directory-authority crash) via a misformatted relay descriptor that is mishandled during voting.
0
Attacker Value
Unknown

CVE-2016-1254

Disclosure Date: December 05, 2017 (last updated November 08, 2023)
Tor before 0.2.8.12 might allow remote attackers to cause a denial of service (client crash) via a crafted hidden service descriptor.
0
Attacker Value
Unknown

CVE-2017-16541

Disclosure Date: November 04, 2017 (last updated November 26, 2024)
Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
Attacker Value
Unknown

CVE-2017-0380

Disclosure Date: September 18, 2017 (last updated November 26, 2024)
The rend_service_intro_established function in or/rendservice.c in Tor before 0.2.8.15, 0.2.9.x before 0.2.9.12, 0.3.0.x before 0.3.0.11, 0.3.1.x before 0.3.1.7, and 0.3.2.x before 0.3.2.1-alpha, when SafeLogging is disabled, allows attackers to obtain sensitive information by leveraging access to the log files of a hidden service, because uninitialized stack data is included in an error message about construction of an introduction point circuit.
0
Attacker Value
Unknown

CVE-2017-0377

Disclosure Date: July 02, 2017 (last updated November 26, 2024)
Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay's family), which might allow remote attackers to defeat intended anonymity properties by leveraging the existence of large families.
0