Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
torproject tor vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2017-0375
The hidden-service feature in Tor prior to 0.3.0.8 allows a denial of service (assertion failure and daemon exit) in the relay_send_end_cell_from_edge_ function via a malformed BEGIN cell.
Torproject Tor
7.5
CVSSv3
CVE-2016-8860
Tor prior to 0.2.8.9 and 0.2.9.x prior to 0.2.9.4-alpha had internal functions that were entitled to expect that buf_t data had NUL termination, but the implementation of or/buffers.c did not ensure that NUL termination was present, which allows remote malicious users to cause a ...
Torproject Tor 0.2.9.3
Torproject Tor 0.2.9.0
Torproject Tor
Torproject Tor 0.2.9.2
Torproject Tor 0.2.9.1
NA
CVE-2014-5117
Tor prior to 0.2.4.23 and 0.2.5 prior to 0.2.5.6-alpha maintains a circuit after an inbound RELAY_EARLY cell is received by a client, which makes it easier for remote malicious users to conduct traffic-confirmation attacks by using the pattern of RELAY and RELAY_EARLY cells as a ...
Torproject Tor 0.0.2
Torproject Tor 0.0.3
Torproject Tor 0.0.4
Torproject Tor 0.0.7.2
Torproject Tor 0.0.7.3
Torproject Tor 0.0.9.5
Torproject Tor 0.0.9.6
Torproject Tor 0.1.0.14
Torproject Tor 0.1.0.15
Torproject Tor 0.1.1.24
Torproject Tor 0.1.1.25
Torproject Tor 0.1.2.18
Torproject Tor 0.1.2.19
Torproject Tor 0.2.2.19
Torproject Tor 0.2.2.20
Torproject Tor 0.2.2.27
Torproject Tor 0.2.2.28
Torproject Tor 0.2.2.35
Torproject Tor 0.2.2.36
Torproject Tor 0.2.3.17
Torproject Tor 0.2.3.18
Torproject Tor 0.2.4.1
NA
CVE-2012-2249
Tor prior to 0.2.3.23-rc allows remote malicious users to cause a denial of service (assertion failure and daemon exit) via a renegotiation attempt that occurs after the initiation of the V3 link protocol.
Torproject Tor 0.2.0.33
Torproject Tor 0.1.1.22
Torproject Tor 0.0.9.4
Torproject Tor 0.2.2.35
Torproject Tor 0.2.2.29
Torproject Tor 0.0.9.1
Torproject Tor 0.1.1.20
Torproject Tor 0.0.2
Torproject Tor 0.2.0.35
Torproject Tor 0.2.2.32
Torproject Tor 0.0.3
Torproject Tor 0.1.1.23
Torproject Tor 0.2.2.24
Torproject Tor 0.2.2.37
Torproject Tor 0.1.0.14
Torproject Tor 0.1.2.15
Torproject Tor
Torproject Tor 0.2.2.21
Torproject Tor 0.2.3.13
Torproject Tor 0.0.6.1
Torproject Tor 0.0.8.1
Torproject Tor 0.1.0.11
NA
CVE-2012-2250
Tor prior to 0.2.3.24-rc allows remote malicious users to cause a denial of service (assertion failure and daemon exit) by performing link protocol negotiation incorrectly.
Torproject Tor 0.2.0.33
Torproject Tor 0.1.1.22
Torproject Tor 0.0.9.4
Torproject Tor 0.2.2.35
Torproject Tor 0.2.2.29
Torproject Tor 0.0.9.1
Torproject Tor 0.1.1.20
Torproject Tor 0.0.2
Torproject Tor
Torproject Tor 0.2.0.35
Torproject Tor 0.2.2.32
Torproject Tor 0.0.3
Torproject Tor 0.1.1.23
Torproject Tor 0.2.2.24
Torproject Tor 0.2.2.37
Torproject Tor 0.1.0.14
Torproject Tor 0.1.2.15
Torproject Tor 0.2.2.21
Torproject Tor 0.2.3.13
Torproject Tor 0.0.6.1
Torproject Tor 0.0.8.1
Torproject Tor 0.1.0.11
NA
CVE-2013-7295
Tor prior to 0.2.4.20, when OpenSSL 1.x is used in conjunction with a certain HardwareAccel setting on Intel Sandy Bridge and Ivy Bridge platforms, does not properly generate random numbers for (1) relay identity keys and (2) hidden-service identity keys, which might make it easi...
Torproject Tor
Torproject Tor 0.2.4.18
Torproject Tor 0.2.4.10
Torproject Tor 0.2.4.9
Torproject Tor 0.2.4.2
Torproject Tor 0.2.4.1
Torproject Tor 0.2.4.17
Torproject Tor 0.2.4.16
Torproject Tor 0.2.4.15
Torproject Tor 0.2.4.8
Torproject Tor 0.2.4.7
Torproject Tor 0.2.4.14
Torproject Tor 0.2.4.13
Torproject Tor 0.2.4.6
Torproject Tor 0.2.4.5
Torproject Tor 0.2.4.12
Torproject Tor 0.2.4.11
Torproject Tor 0.2.4.4
Torproject Tor 0.2.4.3
NA
CVE-2012-5573
The connection_edge_process_relay_cell function in or/relay.c in Tor prior to 0.2.3.25 maintains circuits even if an unexpected SENDME cell arrives, which might allow remote malicious users to cause a denial of service (memory consumption or excessive cell reception rate) or bypa...
Torproject Tor 0.2.3.21
Torproject Tor 0.2.3.20
Torproject Tor 0.2.3.19
Torproject Tor 0.2.3.13
Torproject Tor 0.2.2.19
Torproject Tor 0.2.2.28
Torproject Tor 0.2.2.27
Torproject Tor 0.2.2.35
Torproject Tor 0.2.2.32
Torproject Tor 0.2.0.31
Torproject Tor 0.2.0.32
Torproject Tor 0.1.0.12
Torproject Tor 0.1.0.14
Torproject Tor 0.1.1.24
Torproject Tor 0.1.1.23
Torproject Tor 0.0.2
Torproject Tor 0.2.3.23
Torproject Tor 0.2.3.22
Torproject Tor 0.2.3.14
Torproject Tor 0.2.3
Torproject Tor 0.2.2.21
Torproject Tor 0.2.2.22
NA
CVE-2012-4419
The compare_tor_addr_to_addr_policy function in or/policies.c in Tor prior to 0.2.2.39, and 0.2.3.x prior to 0.2.3.21-rc, allows remote malicious users to cause a denial of service (assertion failure and daemon exit) via a zero-valued port field that is not properly handled durin...
Torproject Tor 0.2.2.34
Torproject Tor 0.2.2.31
Torproject Tor 0.2.2.25
Torproject Tor 0.2.2.24
Torproject Tor 0.2.0.35
Torproject Tor 0.2.0.34
Torproject Tor 0.2.0.33
Torproject Tor 0.1.2.16
Torproject Tor 0.1.2.15
Torproject Tor 0.1.1.22
Torproject Tor 0.1.1.21
Torproject Tor 0.1.0.12
Torproject Tor 0.1.0.11
Torproject Tor 0.1.0.10
Torproject Tor 0.0.9.4
Torproject Tor 0.0.9.3
Torproject Tor 0.0.7
Torproject Tor 0.0.6.2
Torproject Tor 0.0.2
Torproject Tor 0.2.3.18
Torproject Tor 0.2.3.17
Torproject Tor
NA
CVE-2012-4922
The tor_timegm function in common/util.c in Tor prior to 0.2.2.39, and 0.2.3.x prior to 0.2.3.22-rc, does not properly validate time values, which allows remote malicious users to cause a denial of service (assertion failure and daemon exit) via a malformed directory object, a di...
Torproject Tor
Torproject Tor 0.2.2.30
Torproject Tor 0.2.2.29
Torproject Tor 0.2.2.22
Torproject Tor 0.2.2.21
Torproject Tor 0.2.0.32
Torproject Tor 0.2.0.31
Torproject Tor 0.1.2.13
Torproject Tor 0.1.1.26
Torproject Tor 0.1.0.17
Torproject Tor 0.1.0.16
Torproject Tor 0.0.9.10
Torproject Tor 0.0.9.9
Torproject Tor 0.0.9.8
Torproject Tor 0.0.9.1
Torproject Tor 0.2.2.37
Torproject Tor 0.2.2.36
Torproject Tor 0.2.2.35
Torproject Tor 0.2.2.28
Torproject Tor 0.2.2.27
Torproject Tor 0.2.2.20
Torproject Tor 0.2.2.19
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4946
CVE-2024-30309
CVE-2024-4761
CVE-2024-30051
type confusion
memory leak
CVE-2024-30293
reflected XSS
CVE-2024-3126
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4