- EPSS 0.44%
- Veröffentlicht 25.01.2010 19:30:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query.
CVE-2010-0384
- EPSS 0.06%
- Veröffentlicht 25.01.2010 19:30:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor 0.2.2.x before 0.2.2.7-alpha, when functioning as a directory mirror, does not prevent logging of the client IP address upon detection of erroneous client behavior, which might make it easier for local users to discover the identities of clients ...
- EPSS 0.46%
- Veröffentlicht 25.01.2010 19:30:01
- Zuletzt bearbeitet 11.04.2025 00:51:21
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations.
- EPSS 0.7%
- Veröffentlicht 10.07.2009 17:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0.35 and 0.1.x before 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an ...
- EPSS 1.38%
- Veröffentlicht 10.07.2009 17:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Tor before 0.2.0.35 allows remote attackers to cause a denial of service (application crash) via a malformed router descriptor.
- EPSS 0.52%
- Veröffentlicht 18.03.2009 02:00:08
- Zuletzt bearbeitet 09.04.2025 00:30:58
Unspecified vulnerability in Tor before 0.2.0.34 allows attackers to cause a denial of service (infinite loop) via "corrupt votes."
- EPSS 0.67%
- Veröffentlicht 18.03.2009 02:00:08
- Zuletzt bearbeitet 09.04.2025 00:30:58
Tor before 0.2.0.34 treats incomplete IPv4 addresses as valid, which has unknown impact and attack vectors related to "Spec conformance," as demonstrated using 192.168.0.
- EPSS 0.72%
- Veröffentlicht 18.03.2009 02:00:08
- Zuletzt bearbeitet 09.04.2025 00:30:58
Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service (exit node crash) via "malformed input."
- EPSS 0.52%
- Veröffentlicht 18.03.2009 02:00:08
- Zuletzt bearbeitet 09.04.2025 00:30:58
Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service via unknown vectors.
CVE-2009-0654
- EPSS 0.3%
- Veröffentlicht 20.02.2009 19:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, o...