Show filters
40 Total Results
Displaying 1-10 of 40
Sort by:
Attacker Value
Unknown

CVE-2016-9079

Disclosure Date: June 11, 2018 (last updated January 28, 2025)
A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows. This vulnerability affects Firefox < 50.0.2, Firefox ESR < 45.5.1, and Thunderbird < 45.5.1.
Attacker Value
Unknown

CVE-2023-23589

Disclosure Date: January 14, 2023 (last updated October 08, 2023)
The SafeSocks option in Tor before 0.4.7.13 has a logic error in which the unsafe SOCKS4 protocol can be used but not the safe SOCKS4a protocol, aka TROVE-2022-002.
Attacker Value
Unknown

CVE-2022-33903

Disclosure Date: July 17, 2022 (last updated October 07, 2023)
Tor 0.4.7.x before 0.4.7.8 allows a denial of service via the wedging of RTT estimation.
Attacker Value
Unknown

CVE-2021-46702

Disclosure Date: February 26, 2022 (last updated October 07, 2023)
Tor Browser 9.0.7 on Windows 10 build 10586 is vulnerable to information disclosure. This could allow local attackers to bypass the intended anonymity feature and obtain information regarding the onion services visited by a local user. This can be accomplished by analyzing RAM memory even several hours after the local user used the product. This occurs because the product doesn't properly free memory.
Attacker Value
Unknown

CVE-2021-39246

Disclosure Date: September 24, 2021 (last updated November 28, 2024)
Tor Browser through 10.5.6 and 11.x through 11.0a4 allows a correlation attack that can compromise the privacy of visits to v2 onion addresses. Exact timestamps of these onion-service visits are logged locally, and an attacker might be able to compare them to timestamp data collected by the destination server (or collected by a rogue site within the Tor network).
Attacker Value
Unknown

CVE-2021-38385

Disclosure Date: August 30, 2021 (last updated November 28, 2024)
Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007.
Attacker Value
Unknown

CVE-2021-34550

Disclosure Date: June 29, 2021 (last updated November 28, 2024)
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor
Attacker Value
Unknown

CVE-2021-34549

Disclosure Date: June 29, 2021 (last updated November 28, 2024)
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency.
Attacker Value
Unknown

CVE-2021-34548

Disclosure Date: June 29, 2021 (last updated November 28, 2024)
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream.
Attacker Value
Unknown

CVE-2021-28089

Disclosure Date: March 19, 2021 (last updated November 08, 2023)
Tor before 0.4.5.7 allows a remote participant in the Tor directory protocol to exhaust CPU resources on a target, aka TROVE-2021-001.