Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tor tor vulnerabilities and exploits
(subscribe to this query)
571
VMScore
CVE-2016-2176
The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL prior to 1.0.1t and 1.0.2 prior to 1.0.2h allows remote malicious users to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.
Openssl Openssl 1.0.2a
Openssl Openssl 1.0.2e
Openssl Openssl 1.0.2b
Openssl Openssl 1.0.2g
Openssl Openssl 1.0.2c
Openssl Openssl 1.0.2
Openssl Openssl
Openssl Openssl 1.0.2f
Openssl Openssl 1.0.2d
1 Article
570
VMScore
CVE-2007-4097
Tor prior to 0.1.2.15 sends "destroy cells" containing the reason for tearing down a circuit, which allows remote malicious users to obtain sensitive information, contrary to specifications.
Tor Tor 0.1.1.1 Alpha
Tor Tor 0.1.2.1 Alpha-cvs
Tor Tor 0.1.0.18
Tor Tor 0.1.1.23
Tor Tor 0.1.0.10
Tor Tor 0.1.0.12
Tor Tor 0.1.1.3 Alpha
Tor Tor 0.1.2.14
Tor Tor 0.1.0.13
Tor Tor 0.1.0.14
Tor Tor 0.1.1.4 Alpha
Tor Tor 0.1.1.2 Alpha
Tor Tor 0.1.1.20
Tor Tor 0.1.1.5 Alpha
Tor Tor 0.1.0.11
570
VMScore
CVE-2006-3407
Tor prior to 0.1.1.20 allows remote malicious users to spoof log entries or possibly execute shell code via strings with non-printable characters.
Tor Tor 0.1.1.1 Alpha
Tor Tor 0.0.6.2
Tor Tor 0.1.0.18
Tor Tor 0.0.2 Pre24
Tor Tor 0.0.2 Pre16
Tor Tor 0.0.5
Tor Tor 0.1.0.7
Tor Tor 0.0.9.8
Tor Tor 0.0.9.10
Tor Tor 0.0.9.2
Tor Tor 0.0.7
Tor Tor 0.1.0.10
Tor Tor 0.0.9
Tor Tor 0.1.0.8
Tor Tor 0.0.9.5
Tor Tor 0.1.0.12
Tor Tor 0.0.9.3
Tor Tor 0.0.2 Pre17
Tor Tor 0.0.8
Tor Tor 0.0.9.9
Tor Tor 0.1.1.3 Alpha
Tor Tor 0.1.0.5
570
VMScore
CVE-2006-3411
TLS handshakes in Tor prior to 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote malicious users to conduct brute force attacks on the encryption keys.
Tor Tor 0.1.1.1 Alpha
Tor Tor 0.0.6.2
Tor Tor 0.1.0.18
Tor Tor 0.0.2 Pre24
Tor Tor 0.0.2 Pre16
Tor Tor 0.0.5
Tor Tor 0.1.0.7
Tor Tor 0.0.9.8
Tor Tor 0.0.9.10
Tor Tor 0.0.9.2
Tor Tor 0.0.7
Tor Tor 0.1.0.10
Tor Tor 0.0.9
Tor Tor 0.1.0.8
Tor Tor 0.0.9.5
Tor Tor 0.1.0.12
Tor Tor 0.0.9.3
Tor Tor 0.0.2 Pre17
Tor Tor 0.0.8
Tor Tor 0.0.9.9
Tor Tor 0.1.1.3 Alpha
Tor Tor 0.1.0.5
570
VMScore
CVE-2006-3412
Tor prior to 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote malicious users to bypass intended access restrictions for dirservers, direct connections, or proxy servers.
Tor Tor 0.1.1.1 Alpha
Tor Tor 0.0.6.2
Tor Tor 0.1.0.18
Tor Tor 0.0.2 Pre24
Tor Tor 0.0.2 Pre16
Tor Tor 0.0.5
Tor Tor 0.1.0.7
Tor Tor 0.0.9.8
Tor Tor 0.0.9.10
Tor Tor 0.0.9.2
Tor Tor 0.0.7
Tor Tor 0.1.0.10
Tor Tor 0.0.9
Tor Tor 0.1.0.8
Tor Tor 0.0.9.5
Tor Tor 0.1.0.12
Tor Tor 0.0.9.3
Tor Tor 0.0.2 Pre17
Tor Tor 0.0.8
Tor Tor 0.0.9.9
Tor Tor 0.1.1.3 Alpha
Tor Tor 0.1.0.5
570
VMScore
CVE-2006-3415
Tor prior to 0.1.1.20 uses improper logic to validate the "OR" destination, which allows remote malicious users to perform a man-in-the-middle (MITM) attack via unspecified vectors.
Tor Tor 0.1.1.1 Alpha
Tor Tor 0.0.6.2
Tor Tor 0.1.0.18
Tor Tor 0.0.2 Pre24
Tor Tor 0.0.2 Pre16
Tor Tor 0.0.5
Tor Tor 0.1.0.7
Tor Tor 0.0.9.8
Tor Tor 0.0.9.10
Tor Tor 0.0.9.2
Tor Tor 0.0.7
Tor Tor 0.1.0.10
Tor Tor 0.0.9
Tor Tor 0.1.0.8
Tor Tor 0.0.9.5
Tor Tor 0.1.0.12
Tor Tor 0.0.9.3
Tor Tor 0.0.2 Pre17
Tor Tor 0.0.8
Tor Tor 0.0.9.9
Tor Tor 0.1.1.3 Alpha
Tor Tor 0.1.0.5
570
VMScore
CVE-2006-3417
Tor client prior to 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote malicious users to be preferred over nodes that are identified as more trustworthy "entry guard" (is_guard) systems by directory authorities.
Tor Tor 0.1.1.1 Alpha
Tor Tor 0.0.6.2
Tor Tor 0.1.0.18
Tor Tor 0.0.2 Pre24
Tor Tor 0.0.2 Pre16
Tor Tor 0.0.5
Tor Tor 0.1.0.7
Tor Tor 0.0.9.8
Tor Tor 0.0.9.10
Tor Tor 0.0.9.2
Tor Tor 0.0.7
Tor Tor 0.1.0.10
Tor Tor 0.0.9
Tor Tor 0.1.0.8
Tor Tor 0.0.9.5
Tor Tor 0.1.0.12
Tor Tor 0.0.9.3
Tor Tor 0.0.2 Pre17
Tor Tor 0.0.8
Tor Tor 0.0.9.9
Tor Tor 0.1.1.3 Alpha
Tor Tor 0.1.0.5
543
VMScore
CVE-2016-6457
A vulnerability in the Cisco Nexus 9000 Series Platform Leaf Switches for Application Centric Infrastructure (ACI) could allow an unauthenticated, adjacent malicious user to cause a denial of service (DoS) condition on the affected device. This vulnerability affects Cisco Nexus 9...
Cisco Application Policy Infrastructure Controller 1.2(3)
Cisco Application Policy Infrastructure Controller 1.2(2)
Cisco Application Policy Infrastructure Controller 1.3(2)
Cisco Application Policy Infrastructure Controller 2.0(1)
Cisco Application Policy Infrastructure Controller 1.3(1)
Cisco Nx-os 11.2(2g)
Cisco Nx-os 11.2(2h)
Cisco Nx-os 11.2(2i)
Cisco Nx-os 11.2(3c)
Cisco Nx-os 11.2(3e)
Cisco Nx-os 11.2(3h)
Cisco Nx-os 11.3(1i)
Cisco Nx-os 11.3(2f)
Cisco Nx-os 11.3(2h)
Cisco Nx-os 11.3(2i)
Cisco Nx-os 12.0(1m)
Cisco Nx-os 12.0(1n)
Cisco Nx-os 12.0(1o)
Cisco Nx-os 12.0(1p)
Cisco Nx-os 12.0(1q)
516
VMScore
CVE-2014-5117
Tor prior to 0.2.4.23 and 0.2.5 prior to 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote malicious users to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a ...
Torproject Tor 0.2.0.33
Torproject Tor 0.1.1.22
Torproject Tor 0.0.9.4
Torproject Tor 0.2.2.35
Torproject Tor 0.2.2.29
Torproject Tor 0.0.9.1
Torproject Tor 0.1.1.20
Torproject Tor 0.0.2
Torproject Tor 0.2.0.35
Torproject Tor 0.2.2.32
Torproject Tor 0.0.3
Torproject Tor
Torproject Tor 0.1.1.23
Torproject Tor 0.2.3.23
Torproject Tor 0.2.4.19
Torproject Tor 0.2.4.15
Torproject Tor 0.2.4.6
Torproject Tor 0.2.5.5
Torproject Tor 0.2.2.24
Torproject Tor 0.2.2.37
Torproject Tor 0.2.4.1
Torproject Tor 0.1.0.14
516
VMScore
CVE-2011-2768
Tor prior to 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client ...
Tor Tor 0.2.1.1.14
Tor Tor 0.2.1.10
Tor Tor 0.2.2.17
Tor Tor 0.1.1.6
Tor Tor 0.2.1.26
Tor Tor 0.1.1.2
Tor Tor 0.2.1.1.4
Tor Tor 0.2.1.1.1
Tor Tor 0.1.1.9
Tor Tor 0.0.6.2
Tor Tor 0.2.1.1.12
Tor Tor 0.2.1.1.8
Tor Tor 0.1.0.18
Tor Tor 0.2.2.8
Tor Tor 0.2.1.1.16
Tor Tor 0.2.0.30
Tor Tor 0.2.2.5
Tor Tor 0.1.1.23
Tor Tor 0.2.1.1.27
Tor Tor 0.0.5
Tor Tor 0.2.0.11
Tor Tor 0.1.0.7
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »