Tor

Tor

58 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.49%
  • Veröffentlicht 07.07.2006 00:05:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Tor before 0.1.1.20 supports server descriptors that contain hostnames instead of IP addresses, which allows remote attackers to arbitrarily group users by providing preferential address resolution.

  • EPSS 0.48%
  • Veröffentlicht 07.07.2006 00:05:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Tor before 0.1.1.20 uses improper logic to validate the "OR" destination, which allows remote attackers to perform a man-in-the-middle (MITM) attack via unspecified vectors.

  • EPSS 0.78%
  • Veröffentlicht 07.07.2006 00:05:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Tor before 0.1.1.20 kills the circuit when it receives an unrecognized relay command, which causes network circuits to be disbanded. NOTE: while this item is listed under the "Security fixes" section of the developer changelog, the developer clarifi...

  • EPSS 0.48%
  • Veröffentlicht 07.07.2006 00:05:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Tor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote attackers to be preferred over nodes that are identified as more trustworthy "entry guard" (is_guard) systems by directory authorities.

  • EPSS 0.48%
  • Veröffentlicht 07.07.2006 00:05:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Tor before 0.1.1.20 does not validate that a server descriptor's fingerprint line matches its identity key, which allows remote attackers to spoof the fingerprint line, which might be trusted by users or other applications.

  • EPSS 1.15%
  • Veröffentlicht 25.01.2006 11:03:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server.

  • EPSS 0.41%
  • Veröffentlicht 23.08.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other s...

  • EPSS 0.64%
  • Veröffentlicht 28.06.2005 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Unknown vulnerability in Tor before 0.1.0.10 allows remote attackers to read arbitrary memory and possibly key information from the exit server's process space.