Filter
AND

Tor TorBuffer Overflow

First published (updated )

Tor TorBuffer Overflow

First published (updated )

Tor TorInfoleak

First published (updated )

Tor TorInfoleak

First published (updated )

Tor TorThe connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Tor TorUnspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors th…

First published (updated )

Tor TorTor before 0.2.0.32 does not properly process the ClientDNSRejectInternalAddresses configuration opt…

First published (updated )

Tor TorTor before 0.2.0.32 does not properly process the (1) User and (2) Group configuration options, whic…

7.2
First published (updated )

Tor TorTor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attacke…

First published (updated )

Tor TorTor before 0.1.1.20 supports server descriptors that contain hostnames instead of IP addresses, whic…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Tor TorTLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than …

First published (updated )

Tor TorUnspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote a…

First published (updated )

Tor TorTor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via …

First published (updated )

Tor TorTor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographicall…

First published (updated )

Tor TorThe privoxy configuration file in Tor before 0.1.1.20, when run on Apple OS X, logs all data via the…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Tor TorTor before 0.1.1.20 does not validate that a server descriptor's fingerprint line matches its identi…

First published (updated )

Tor TorTor before 0.1.1.20 uses improper logic to validate the "OR" destination, which allows remote attack…

First published (updated )

Tor TorTor before 0.1.1.20 kills the circuit when it receives an unrecognized relay command, which causes n…

First published (updated )

Tor TorBuffer Overflow, Integer Overflow

7.5
First published (updated )

Tor TorTor before 0.1.1.20 creates "internal circuits" primarily consisting of nodes with "useful exit node…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Tor TorTor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could all…

First published (updated )

Tor TorTor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server t…

First published (updated )

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203