NVD List

Id Name Description Reject CVSS Version CVSS Score Severity Pub Date Modified Date Actions
62085  CVE-2006-3407  Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters.    6.4  Medium  2016-12-20  2008-09-10  View
59152  CVE-2006-0414  Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server.    Medium  2016-12-20  2008-09-05  View
65436  CVE-2006-6893  Tor allows remote attackers to discover the IP address of a hidden service by accessing this service at a high rate, thereby changing the server"s CPU temperature and consequently changing the pattern of time values visible through (1) ICMP timestamps, (2) TCP sequence numbers, and (3) TCP timestamps, a different vulnerability than CVE-2006-0414. NOTE: it could be argued that this is a laws-of-physics vulnerability that is a fundamental design limitation of certain hardware implementations, so perhaps this issue should not be included in CVE.    Medium  2016-12-20  2008-09-05  View
87493  CVE-2017-0377  Tor 0.3.x before 0.3.0.9 has a guard-selection algorithm that only considers the exit relay (not the exit relay's family), which might allow remote attackers to defeat intended anonymity properties by leveraging the existence of large families.    Medium  2017-07-18  2017-07-14  View
11943  CVE-2010-0384  Tor 0.2.2.x before 0.2.2.7-alpha, when functioning as a directory mirror, does not prevent logging of the client IP address upon detection of erroneous client behavior, which might make it easier for local users to discover the identities of clients in opportunistic circumstances by reading log files.    2.1  Low  2017-01-18  2011-04-27  View

Page 2490 of 17672, showing 5 records out of 88360 total, starting on record 12446, ending on 12450

Actions