CVE-2025-4444
- EPSS 0.06%
- Veröffentlicht 18.09.2025 13:58:52
- Zuletzt bearbeitet 19.09.2025 16:00:27
A security flaw has been discovered in Tor up to 0.4.7.16/0.4.8.17. Impacted is an unknown function of the component Onion Service Descriptor Handler. Performing manipulation results in resource consumption. The attack may be initiated remotely. The ...
- EPSS 0.64%
- Veröffentlicht 26.08.2012 03:17:44
- Zuletzt bearbeitet 11.04.2025 00:51:21
routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack...
- EPSS 1.46%
- Veröffentlicht 26.08.2012 03:17:44
- Zuletzt bearbeitet 11.04.2025 00:51:21
The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted ...
- EPSS 1.46%
- Veröffentlicht 26.08.2012 03:17:44
- Zuletzt bearbeitet 11.04.2025 00:51:21
Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests.
CVE-2011-4897
- EPSS 0.25%
- Veröffentlicht 23.12.2011 03:59:22
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value.
CVE-2011-4896
- EPSS 0.25%
- Veröffentlicht 23.12.2011 03:59:22
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitorin...
CVE-2011-4895
- EPSS 0.25%
- Veröffentlicht 23.12.2011 03:59:22
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.
CVE-2011-4894
- EPSS 0.25%
- Veröffentlicht 23.12.2011 03:59:22
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by observing DirPort connections.
CVE-2011-2778
- EPSS 3.51%
- Veröffentlicht 23.12.2011 03:59:22
- Zuletzt bearbeitet 11.04.2025 00:51:21
Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy...
CVE-2011-2769
- EPSS 0.26%
- Veröffentlicht 23.12.2011 03:59:21
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values.