Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tor tor 0.1.1.23 vulnerabilities and exploits
(subscribe to this query)
5.8
CVSSv2
CVE-2007-4099
Tor prior to 0.1.2.15 can select a guard node beyond the first listed never-before-connected-to guard node, which allows remote attackers with control of certain guard nodes to obtain sensitive information and possibly leverage further attacks.
Tor Tor 0.1.0.10
Tor Tor 0.1.1.20
Tor Tor 0.1.1.23
Tor Tor 0.1.0.11
Tor Tor 0.1.0.12
Tor Tor 0.1.1.3 Alpha
Tor Tor 0.1.1.4 Alpha
Tor Tor 0.1.0.13
Tor Tor 0.1.0.14
Tor Tor 0.1.0.18
Tor Tor 0.1.1.5 Alpha
Tor Tor 0.1.2.1 Alpha-cvs
Tor Tor 0.1.1.1 Alpha
Tor Tor 0.1.1.2 Alpha
Tor Tor 0.1.2.14
5.8
CVSSv2
CVE-2007-4096
Buffer overflow in Tor prior to 0.1.2.15, when using BSD natd support, allows remote malicious users to cause a denial of service via unspecified vectors.
Tor Tor 0.1.0.11
Tor Tor 0.1.0.12
Tor Tor 0.1.1.3 Alpha
Tor Tor 0.1.1.1 Alpha
Tor Tor 0.1.1.2 Alpha
Tor Tor 0.1.2.14
Tor Tor 0.1.0.10
Tor Tor 0.1.1.20
Tor Tor 0.1.1.23
Tor Tor 0.1.1.4 Alpha
Tor Tor 0.1.0.13
Tor Tor 0.1.0.14
Tor Tor 0.1.0.18
Tor Tor 0.1.1.5 Alpha
Tor Tor 0.1.2.1 Alpha-cvs
5
CVSSv2
CVE-2012-2249
Tor prior to 0.2.3.23-rc allows remote malicious users to cause a denial of service (assertion failure and daemon exit) via a renegotiation attempt that occurs after the initiation of the V3 link protocol.
Torproject Tor 0.2.0.33
Torproject Tor 0.1.1.22
Torproject Tor 0.0.9.4
Torproject Tor 0.2.2.35
Torproject Tor 0.2.2.29
Torproject Tor 0.0.9.1
Torproject Tor 0.1.1.20
Torproject Tor 0.0.2
Torproject Tor 0.2.0.35
Torproject Tor 0.2.2.32
Torproject Tor 0.0.3
Torproject Tor 0.1.1.23
Torproject Tor 0.2.2.24
Torproject Tor 0.2.2.37
Torproject Tor 0.1.0.14
Torproject Tor 0.1.2.15
Torproject Tor
Torproject Tor 0.2.2.21
Torproject Tor 0.2.3.13
Torproject Tor 0.0.6.1
Torproject Tor 0.0.8.1
Torproject Tor 0.1.0.11
5
CVSSv2
CVE-2012-2250
Tor prior to 0.2.3.24-rc allows remote malicious users to cause a denial of service (assertion failure and daemon exit) by performing link protocol negotiation incorrectly.
Torproject Tor 0.2.0.33
Torproject Tor 0.1.1.22
Torproject Tor 0.0.9.4
Torproject Tor 0.2.2.35
Torproject Tor 0.2.2.29
Torproject Tor 0.0.9.1
Torproject Tor 0.1.1.20
Torproject Tor 0.0.2
Torproject Tor
Torproject Tor 0.2.0.35
Torproject Tor 0.2.2.32
Torproject Tor 0.0.3
Torproject Tor 0.1.1.23
Torproject Tor 0.2.2.24
Torproject Tor 0.2.2.37
Torproject Tor 0.1.0.14
Torproject Tor 0.1.2.15
Torproject Tor 0.2.2.21
Torproject Tor 0.2.3.13
Torproject Tor 0.0.6.1
Torproject Tor 0.0.8.1
Torproject Tor 0.1.0.11
5
CVSSv2
CVE-2012-5573
The connection_edge_process_relay_cell function in or/relay.c in Tor prior to 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote malicious users to cause a denial of service (memory consumption or excessive cell reception rate) or bypa...
Torproject Tor 0.2.3.21
Torproject Tor 0.2.3.20
Torproject Tor 0.2.3.19
Torproject Tor 0.2.3.13
Torproject Tor 0.2.2.19
Torproject Tor 0.2.2.28
Torproject Tor 0.2.2.27
Torproject Tor 0.2.2.35
Torproject Tor 0.2.2.32
Torproject Tor 0.2.0.31
Torproject Tor 0.2.0.32
Torproject Tor 0.1.0.12
Torproject Tor 0.1.0.14
Torproject Tor 0.1.1.24
Torproject Tor 0.1.1.23
Torproject Tor 0.0.2
Torproject Tor 0.2.3.23
Torproject Tor 0.2.3.22
Torproject Tor 0.2.3.14
Torproject Tor 0.2.3
Torproject Tor 0.2.2.21
Torproject Tor 0.2.2.22
5
CVSSv2
CVE-2012-4419
The compare_tor_addr_to_addr_policy function in or/policies.c in Tor prior to 0.2.2.39, and 0.2.3.x prior to 0.2.3.21-rc, allows remote malicious users to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled durin...
Torproject Tor 0.2.2.34
Torproject Tor 0.2.2.31
Torproject Tor 0.2.2.25
Torproject Tor 0.2.2.24
Torproject Tor 0.2.0.35
Torproject Tor 0.2.0.34
Torproject Tor 0.2.0.33
Torproject Tor 0.1.2.16
Torproject Tor 0.1.2.15
Torproject Tor 0.1.1.22
Torproject Tor 0.1.1.21
Torproject Tor 0.1.0.12
Torproject Tor 0.1.0.11
Torproject Tor 0.1.0.10
Torproject Tor 0.0.9.4
Torproject Tor 0.0.9.3
Torproject Tor 0.0.7
Torproject Tor 0.0.6.2
Torproject Tor 0.0.2
Torproject Tor 0.2.3.18
Torproject Tor 0.2.3.17
Torproject Tor
5
CVSSv2
CVE-2012-4922
The tor_timegm function in common/util.c in Tor prior to 0.2.2.39, and 0.2.3.x prior to 0.2.3.22-rc, does not properly validate time values, which allows remote malicious users to cause a denial of service (assertion failure and daemon exit) via a malformed directory object, a di...
Torproject Tor
Torproject Tor 0.2.2.30
Torproject Tor 0.2.2.29
Torproject Tor 0.2.2.22
Torproject Tor 0.2.2.21
Torproject Tor 0.2.0.32
Torproject Tor 0.2.0.31
Torproject Tor 0.1.2.13
Torproject Tor 0.1.1.26
Torproject Tor 0.1.0.17
Torproject Tor 0.1.0.16
Torproject Tor 0.0.9.10
Torproject Tor 0.0.9.9
Torproject Tor 0.0.9.8
Torproject Tor 0.0.9.1
Torproject Tor 0.2.2.37
Torproject Tor 0.2.2.36
Torproject Tor 0.2.2.35
Torproject Tor 0.2.2.28
Torproject Tor 0.2.2.27
Torproject Tor 0.2.2.20
Torproject Tor 0.2.2.19
5
CVSSv2
CVE-2011-1924
Buffer overflow in the policy_summarize function in or/policies.c in Tor prior to 0.2.1.30 allows remote malicious users to cause a denial of service (directory authority crash) via a crafted policy that triggers creation of a long port list.
Tor Tor 0.0.7.3
Tor Tor 0.0.7.2
Tor Tor 0.0.7.1
Tor Tor 0.0.7
Tor Tor 0.1.0.1
Tor Tor 0.1.0.10
Tor Tor 0.0.9.8
Tor Tor 0.0.9.9
Tor Tor 0.0.2 Pre17
Tor Tor 0.1.1
Tor Tor 0.0.2 Pre18
Tor Tor 0.0.2 Pre19
Tor Tor 0.1.1.3
Tor Tor 0.1.1.26
Tor Tor 0.1.1.6
Tor Tor 0.1.1.5
Tor Tor 0.1.0.2
Tor Tor 0.1.0.19
Tor Tor 0.1.0.4
Tor Tor 0.1.0.3
Tor Tor 0.1.1.14
Tor Tor 0.1.1.15
5
CVSSv2
CVE-2011-0015
Tor prior to 0.2.1.29 and 0.2.2.x prior to 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote malicious users to cause a denial of service via a large compression factor.
Tor Tor 0.2.1.11
Tor Tor 0.2.1.12
Tor Tor 0.2.1.17
Tor Tor 0.2.1.19
Tor Tor 0.2.1.20
Tor Tor 0.2.1.25
Tor Tor 0.2.1.27
Tor Tor 0.2.1.8
Tor Tor 0.2.0.31
Tor Tor 0.2.0.32
Tor Tor 0.2.0.28
Tor Tor 0.2.0.25
Tor Tor 0.2.0.27
Tor Tor 0.2.0.16
Tor Tor 0.2.0.18
Tor Tor 0.2.0.8
Tor Tor 0.2.0.11
Tor Tor 0.2.0.1
Tor Tor 0.2.0.3
Tor Tor 0.1.2.13
Tor Tor 0.1.2.5
Tor Tor 0.1.2.11
5
CVSSv2
CVE-2011-0491
The tor_realloc function in Tor prior to 0.2.1.29 and 0.2.2.x prior to 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote malicious users to cause a denial of service (daemon crash) via unspecified vectors, related to "un...
Tor Tor 0.2.1.12
Tor Tor 0.2.1.13
Tor Tor 0.2.1.20
Tor Tor 0.2.1.21
Tor Tor
Tor Tor 0.2.1.3
Tor Tor 0.2.0.31
Tor Tor 0.2.0.25
Tor Tor 0.2.0.22
Tor Tor 0.2.0.34
Tor Tor 0.2.0.15
Tor Tor 0.2.0.8
Tor Tor 0.2.0.7
Tor Tor 0.2.0.6
Tor Tor 0.2.0.3
Tor Tor 0.2.0.4
Tor Tor 0.2.1.11
Tor Tor 0.2.1.19
Tor Tor 0.2.1.2
Tor Tor 0.2.1.26
Tor Tor 0.2.1.27
Tor Tor 0.2.1.8
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »