Show filters
49 Total Results
Displaying 31-40 of 49
Sort by:
Attacker Value
Unknown

CVE-2007-4098

Disclosure Date: July 30, 2007 (last updated October 04, 2023)
Tor before 0.1.2.15 does not properly distinguish "streamids from different exits," which might allow remote attackers with control over Tor routers to inject cells into arbitrary streams.
0
Attacker Value
Unknown

CVE-2007-4099

Disclosure Date: July 30, 2007 (last updated October 04, 2023)
Tor before 0.1.2.15 can select a guard node beyond the first listed never-before-connected-to guard node, which allows remote attackers with control of certain guard nodes to obtain sensitive information and possibly leverage further attacks.
0
Attacker Value
Unknown

CVE-2007-3165

Disclosure Date: June 11, 2007 (last updated October 04, 2023)
Tor before 0.1.2.14 can construct circuits in which an entry guard is in the same family as the exit node, which might compromise the anonymity of traffic sources and destinations by exposing traffic to inappropriate remote observers.
0
Attacker Value
Unknown

CVE-2006-4508

Disclosure Date: August 31, 2006 (last updated October 04, 2023)
Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service (flood) via unspecified vectors.
0
Attacker Value
Unknown

CVE-2006-3408

Disclosure Date: July 07, 2006 (last updated October 04, 2023)
Unspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote attackers to cause an unspecified denial of service via unknown vectors.
0
Attacker Value
Unknown

CVE-2006-3407

Disclosure Date: July 07, 2006 (last updated October 04, 2023)
Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters.
0
Attacker Value
Unknown

CVE-2006-3411

Disclosure Date: July 07, 2006 (last updated October 04, 2023)
TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys.
0
Attacker Value
Unknown

CVE-2006-3417

Disclosure Date: July 07, 2006 (last updated October 04, 2023)
Tor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote attackers to be preferred over nodes that are identified as more trustworthy "entry guard" (is_guard) systems by directory authorities.
0
Attacker Value
Unknown

CVE-2006-3416

Disclosure Date: July 07, 2006 (last updated November 08, 2023)
Tor before 0.1.1.20 kills the circuit when it receives an unrecognized relay command, which causes network circuits to be disbanded. NOTE: while this item is listed under the "Security fixes" section of the developer changelog, the developer clarified on 20060707 that this is only a self-DoS. Therefore this issue should not be included in CVE
0
Attacker Value
Unknown

CVE-2006-3409

Disclosure Date: July 07, 2006 (last updated October 04, 2023)
Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists.
0