Page 17 of 85 results (0.005 seconds)

CVSS: 5.0EPSS: 4%CPEs: 68EXPL: 0

Unspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote attackers to cause an unspecified denial of service via unknown vectors. Vulnerabilidad sin especificar en el servidor de directorios (dirserver) en Tor antes de 0.1.1.20 permite a atacantes remotos provocar una denegación de servicio no especificada a través de vectores desconocidos. • http://secunia.com/advisories/20277 http://secunia.com/advisories/20514 http://security.gentoo.org/glsa/glsa-200606-04.xml http://tor.eff.org/cvs/tor/ChangeLog http://www.osvdb.org/25883 http://www.securityfocus.com/bid/18323 https://exchange.xforce.ibmcloud.com/vulnerabilities/26794 •

CVSS: 7.5EPSS: 25%CPEs: 68EXPL: 0

Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists. Desbordamiento de entero en Tor versiones anteriores a la 0.1.1.20, permite a atacantes remotos ejecutar código de su elección a través de entradas largas manipuladas, lo cual provoca un desbordamiento de búfer cuando se añaden elementos a las smartlists • http://secunia.com/advisories/20277 http://secunia.com/advisories/20514 http://security.gentoo.org/glsa/glsa-200606-04.xml http://tor.eff.org/cvs/tor/ChangeLog http://www.securityfocus.com/bid/18323 https://exchange.xforce.ibmcloud.com/vulnerabilities/26795 •

CVSS: 6.4EPSS: 0%CPEs: 68EXPL: 0

Tor before 0.1.1.20 uses improper logic to validate the "OR" destination, which allows remote attackers to perform a man-in-the-middle (MITM) attack via unspecified vectors. Tor versiones anteriores a 0.1.1.20 utiliza una lógica inapropiada para validar el destino "OR", lo cual permite a atacantes remotos llevar a cabo un ataque man-in-the-middle (MITM) a través de vectores no especificados. • http://secunia.com/advisories/20514 http://security.gentoo.org/glsa/glsa-200606-04.xml http://tor.eff.org/cvs/tor/ChangeLog http://www.osvdb.org/25878 •

CVSS: 5.0EPSS: 0%CPEs: 68EXPL: 0

Tor before 0.1.1.20 does not validate that a server descriptor's fingerprint line matches its identity key, which allows remote attackers to spoof the fingerprint line, which might be trusted by users or other applications. • http://secunia.com/advisories/20514 http://security.gentoo.org/glsa/glsa-200606-04.xml http://tor.eff.org/cvs/tor/ChangeLog http://www.osvdb.org/25881 •

CVSS: 5.0EPSS: 1%CPEs: 57EXPL: 0

Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server. Tor anterior a 0.1.1.10 permite a atacantes remotos identificar servicios ocultos mediante un servidor Tor malicioso que intenta un gran número de accesos al servicio oculto, lo que acaba causando que un circuito sea construido a través del servidor malicioso. • http://archives.seul.org/or/announce/Jan-2006/msg00001.html http://secunia.com/advisories/18576 http://secunia.com/advisories/20514 http://security.gentoo.org/glsa/glsa-200606-04.xml http://tor.eff.org/cvs/tor/ChangeLog http://www.osvdb.org/22689 http://www.securityfocus.com/bid/18323 http://www.securityfocus.com/bid/19795 https://exchange.xforce.ibmcloud.com/vulnerabilities/24285 •