7 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

03 Dec 2017 — In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, the replay-cache protection mechanism is ineffective for v2 onion services, aka TROVE-2017-009. An attacker can send many INTRODUCE2 cells to trigger this issue. En Tor, en versiones anteriores a la 0.2.5.16; de la versión 0.2.6 hasta la 0.2.8 anterior a la 0.2.8.17; versiones 0.2.9 anteriores a la 0.2.9.14; versiones 0.3.0 anteriores a la 0.3.0.13 y versiones 0.3.1 anteriores... • https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516 •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

03 Dec 2017 — In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, remote attackers can cause a denial of service (NULL pointer dereference and application crash) against directory authorities via a malformed descriptor, aka TROVE-2017-010. En Tor, en versiones anteriores a la 0.2.5.16; de la versión 0.2.6 hasta la 0.2.8 anterior a la 0.2.8.17, versiones 0.2.9 anteriores a la 0.2.9.14; versiones 0.3.0 anteriores a la 0.3.0.13 y versiones 0.3.... • https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516 • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 0

03 Dec 2017 — In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, an attacker can cause a denial of service (application hang) via crafted PEM input that signifies a public key requiring a password, which triggers an attempt by the OpenSSL library to ask the user for the password, aka TROVE-2017-011. En Tor, en versiones anteriores a la 0.2.5.16; de la versión 0.2.6 hasta la 0.2.8 anterior a la 0.2.8.17; versiones 0.2.9 anteriores a la 0.2.9... • https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 0%CPEs: 7EXPL: 0

03 Dec 2017 — In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, relays (that have incompletely downloaded descriptors) can pick themselves in a circuit path, leading to a degradation of anonymity, aka TROVE-2017-012. En Tor, en versiones anteriores a la 0.2.5.16; de la versión 0.2.6 hasta la 0.2.8 anterior a la 0.2.8.17; versiones 0.2.9 anteriores a la 0.2.9.14; versiones 0.3.0 anteriores a la 0.3.0.13 y versiones 0.3.1 anteriores a la 0.3... • https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516 • CWE-417: Communication Channel Errors •

CVSS: 8.1EPSS: 0%CPEs: 7EXPL: 0

03 Dec 2017 — In Tor before 0.2.5.16, 0.2.6 through 0.2.8 before 0.2.8.17, 0.2.9 before 0.2.9.14, 0.3.0 before 0.3.0.13, and 0.3.1 before 0.3.1.9, there is a use-after-free in onion service v2 during intro-point expiration because the expiring list is mismanaged in certain error cases, aka TROVE-2017-013. En Tor, en versiones anteriores a la 0.2.5.16; de la versión 0.2.6 hasta la 0.2.8 anterior a la 0.2.8.17: versiones 0.2.9 anteriores a la 0.2.9.14; versiones 0.3.0 anteriores a la 0.3.0.13 y versiones 0.3.1 anteriores a... • https://blog.torproject.org/new-stable-tor-releases-security-fixes-0319-03013-02914-02817-02516 • CWE-416: Use After Free •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

07 Feb 2017 — Tor Browser Launcher (aka torbrowser-launcher) before 0.2.4, during the initial run, allows man-in-the-middle attackers to bypass the PGP signature verification and execute arbitrary code via a Trojan horse tar file and a signature file with the valid tarball and signature. Tor Browser Launcher (también conocido como torbrowser-launcher) en versiones anteriores a 0.2.4, durante la ejecución inicial, permite a atacantes man-in-the-middle eludir la verificación de la firma PGP y ejecutar código arbitrario a t... • http://www.securityfocus.com/bid/96140 • CWE-254: 7PK - Security Features •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

09 Sep 2014 — The Tor Browser the Short Guide (aka com.wTorShortUserManual) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. La aplicación Tor Browser the Short Guide (también conocido como com.wTorShortUserManual) 0.1 para Android no verifica los certificados X.509 de los servidores SSL, lo que permite a atacantes man-in-the-middle falsificar servidores y obtener informaci... • http://www.kb.cert.org/vuls/id/354049 • CWE-310: Cryptographic Issues •