
CVE-2020-8516
https://notcve.org/view.php?id=CVE-2020-8516
02 Feb 2020 — The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability ** EN DISPUTA ** El demonio en Tor hasta la versión 0.4.1.8 y versiones 0.4.2.x hasta la versión 0.4.2.6, no comprueba que un nodo rendezvous sea conocido antes de intentar conectarse a él, lo qu... • https://lists.torproject.org/pipermail/tor-dev/2020-February/014146.html •

CVE-2017-16541 – Mozilla: Proxy bypass using automount and autofs
https://notcve.org/view.php?id=CVE-2017-16541
04 Nov 2017 — Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected. El navegador Tor en versiones anteriores a la 7.0.9 en macOS y Linux permite que atacantes remotos sin omitan las características de anonimato previstas y descubran una dirección IP de cliente mediante vectores que impliquen un sitio web mani... • https://packetstorm.news/files/id/149298 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •