Lucene search

K

Tor Security Vulnerabilities

cve
cve

CVE-2007-3165

Tor before 0.1.2.14 can construct circuits in which an entry guard is in the same family as the exit node, which might compromise the anonymity of traffic sources and destinations by exposing traffic to inappropriate remote...

6.4AI Score

0.004EPSS

2007-06-11 10:30 PM
18
cve
cve

CVE-2007-1103

Tor does not verify a node's uptime and bandwidth advertisements, which allows remote attackers who operate a low resource node to make false claims of greater resources, which places the node into use for many circuits and compromises the anonymity of traffic sources and...

6.6AI Score

0.01EPSS

2007-02-26 05:28 PM
24
cve
cve

CVE-2006-4508

Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service (flood) via unspecified...

6.9AI Score

0.016EPSS

2006-08-31 11:04 PM
26
cve
cve

CVE-2006-3407

Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable...

7.4AI Score

0.009EPSS

2006-07-07 12:05 AM
22
cve
cve

CVE-2006-3408

Unspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote attackers to cause an unspecified denial of service via unknown...

6.6AI Score

0.047EPSS

2006-07-07 12:05 AM
21
cve
cve

CVE-2006-3410

Tor before 0.1.1.20 creates "internal circuits" primarily consisting of nodes with "useful exit nodes," which allows remote attackers to conduct unspecified statistical...

6.7AI Score

0.01EPSS

2006-07-07 12:05 AM
21
cve
cve

CVE-2006-3409

Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to...

8.1AI Score

0.257EPSS

2006-07-07 12:05 AM
19
cve
cve

CVE-2006-0414

Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious...

6.2AI Score

0.012EPSS

2006-01-25 11:03 AM
25
cve
cve

CVE-2005-2643

Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the...

6.1AI Score

0.004EPSS

2005-08-23 04:00 AM
31
cve
cve

CVE-2005-2050

Unknown vulnerability in Tor before 0.1.0.10 allows remote attackers to read arbitrary memory and possibly key information from the exit server's process...

6.4AI Score

0.033EPSS

2005-06-28 04:00 AM
22
Total number of security vulnerabilities110