Page 13 of 71 results (0.007 seconds)

CVSS: 10.0EPSS: 1%CPEs: 160EXPL: 1

Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption. Vulnerabilidad sin especificar en Tor anterior a v0.2.0.33 tiene un impacto y vectores de ataque desconocidos que lanzan una corrupción de montículo (heap). • http://archives.seul.org/or/announce/Jan-2009/msg00000.html http://blog.torproject.org/blog/tor-0.2.0.33-stable-released http://secunia.com/advisories/33635 http://secunia.com/advisories/33677 http://secunia.com/advisories/34583 http://security.gentoo.org/glsa/glsa-200904-11.xml http://www.securityfocus.com/bid/33399 http://www.securitytracker.com/id?1021633 http://www.vupen.com/english/advisories/2009/0210 https://www.redhat.com/archives/fedora-package-announce/2009-Janu • CWE-399: Resource Management Errors •

CVSS: 7.2EPSS: 0%CPEs: 100EXPL: 0

Tor before 0.2.0.32 does not properly process the (1) User and (2) Group configuration options, which might allow local users to gain privileges by leveraging unintended supplementary group memberships of the Tor process. Tor anterior a v0.2.32 no procesa adecuadamente la configuración de las opciones de (1)usuario (User) y (2) Grupo (group), lo que permitiría a usuarios locales obtener privilegios aprovechando la pertenencia a grupos creados por defecto en los procesos de Tor. • http://blog.torproject.org/blog/tor-0.2.0.32-released http://secunia.com/advisories/33025 http://secunia.com/advisories/34583 http://security.gentoo.org/glsa/glsa-200904-11.xml http://www.securityfocus.com/bid/32648 http://www.vupen.com/english/advisories/2008/3366 https://exchange.xforce.ibmcloud.com/vulnerabilities/47101 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.3EPSS: 0%CPEs: 100EXPL: 0

Tor before 0.2.0.32 does not properly process the ClientDNSRejectInternalAddresses configuration option in situations where an exit relay issues a policy-based refusal of a stream, which allows remote exit relays to have an unknown impact by mapping an internal IP address to the destination hostname of a refused stream. Tor anterior a v0.2.0.32 no procesa adecuadamente la opción de configuración ClientDNSRejectInternalAddresses en situaciones donde una cuestión en la salida de transmisión de una política que deniega el flujo, puede permitir a flujos de salida remotos tener un impacto desconocido mediante el mapeo de una dirección IP interna hacia el nombre de host destino de una flujo denegado. • http://blog.torproject.org/blog/tor-0.2.0.32-released http://secunia.com/advisories/33025 http://secunia.com/advisories/34583 http://security.gentoo.org/glsa/glsa-200904-11.xml http://www.securityfocus.com/bid/32648 http://www.vupen.com/english/advisories/2008/3366 https://exchange.xforce.ibmcloud.com/vulnerabilities/47102 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.8EPSS: 1%CPEs: 16EXPL: 2

Tor before 0.1.2.16, when ControlPort is enabled, does not properly restrict commands to localhost port 9051, which allows remote attackers to modify the torrc configuration file, compromise anonymity, and have other unspecified impact via HTTP POST data containing commands without valid authentication, as demonstrated by an HTML form (1) hosted on a web site or (2) injected by a Tor exit node. Tor versiones anteriores a 0.1.2.16, cuando ControlPort está habilitado, no restringe apropiadamente los comandos al puerto localhost 9051, lo que permite a atacantes remotos modificar el archivo de configuración de torrc, comprometer el anonimato y presentar otro impacto no especificado por medio de datos POST HTTP que contienen comandos sin autenticación válida, como es demostrado por un formulario HTML (1) alojado en un sitio web o (2) inyectado por un nodo de salida Tor. • https://www.exploit-db.com/exploits/30447 https://www.exploit-db.com/exploits/4468 http://archives.seul.org/or/announce/Aug-2007/msg00000.html http://archives.seul.org/or/announce/Sep-2007/msg00000.html http://osvdb.org/36271 http://secunia.com/advisories/26301 http://www.securityfocus.com/bid/25188 http://www.securitytracker.com/id?1018510 http://www.vupen.com/english/advisories/2007/2768 https://exchange.xforce.ibmcloud.com/vulnerabilities/35784 https://exchange.xforce • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.8EPSS: 1%CPEs: 15EXPL: 0

Tor before 0.1.2.15 can select a guard node beyond the first listed never-before-connected-to guard node, which allows remote attackers with control of certain guard nodes to obtain sensitive information and possibly leverage further attacks. Tor anterior a 0.1.2.15 podría seleccionar un nodo guardía más allá del nodo protector nunca-antes-conectar-a, el cual podría permitir a atacantes remotos con control sobre ciertos nodos guarda obtener información sensible y posiblemente llevar a cabo ataques adicionales. • http://archives.seul.org/or/announce/Jul-2007/msg00000.html http://osvdb.org/46971 http://secunia.com/advisories/26140 http://www.securityfocus.com/bid/25035 http://www.vupen.com/english/advisories/2007/2634 •