Vulnerabilites related to tor - tor
CVE-2007-4174 (GCVE-0-2007-4174)
Vulnerability from cvelistv5
Published
2007-08-07 10:00
Modified
2024-08-07 14:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.1.2.16, when ControlPort is enabled, does not properly restrict commands to localhost port 9051, which allows remote attackers to modify the torrc configuration file, compromise anonymity, and have other unspecified impact via HTTP POST data containing commands without valid authentication, as demonstrated by an HTML form (1) hosted on a web site or (2) injected by a Tor exit node.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:39.367Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25188", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25188" }, { "name": "tor-control-command-execution(36407)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36407" }, { "name": "1018510", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018510" }, { "name": "tor-controlport-security-bypass(35784)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35784" }, { "name": "ADV-2007-2768", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2768" }, { "name": "36271", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36271" }, { "name": "26301", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26301" }, { "name": "[or-announce] 20070901 Tor security advisory: cross-protocol http form attack", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Sep-2007/msg00000.html" }, { "name": "[or-announce] 20070802 Tor 0.1.2.16 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Aug-2007/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-08-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.16, when ControlPort is enabled, does not properly restrict commands to localhost port 9051, which allows remote attackers to modify the torrc configuration file, compromise anonymity, and have other unspecified impact via HTTP POST data containing commands without valid authentication, as demonstrated by an HTML form (1) hosted on a web site or (2) injected by a Tor exit node." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25188", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25188" }, { "name": "tor-control-command-execution(36407)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36407" }, { "name": "1018510", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018510" }, { "name": "tor-controlport-security-bypass(35784)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35784" }, { "name": "ADV-2007-2768", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2768" }, { "name": "36271", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36271" }, { "name": "26301", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26301" }, { "name": "[or-announce] 20070901 Tor security advisory: cross-protocol http form attack", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Sep-2007/msg00000.html" }, { "name": "[or-announce] 20070802 Tor 0.1.2.16 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Aug-2007/msg00000.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4174", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.2.16, when ControlPort is enabled, does not properly restrict commands to localhost port 9051, which allows remote attackers to modify the torrc configuration file, compromise anonymity, and have other unspecified impact via HTTP POST data containing commands without valid authentication, as demonstrated by an HTML form (1) hosted on a web site or (2) injected by a Tor exit node." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25188", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25188" }, { "name": "tor-control-command-execution(36407)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36407" }, { "name": "1018510", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018510" }, { "name": "tor-controlport-security-bypass(35784)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35784" }, { "name": "ADV-2007-2768", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2768" }, { "name": "36271", "refsource": "OSVDB", "url": "http://osvdb.org/36271" }, { "name": "26301", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26301" }, { "name": "[or-announce] 20070901 Tor security advisory: cross-protocol http form attack", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Sep-2007/msg00000.html" }, { "name": "[or-announce] 20070802 Tor 0.1.2.16 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Aug-2007/msg00000.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4174", "datePublished": "2007-08-07T10:00:00", "dateReserved": "2007-08-07T00:00:00", "dateUpdated": "2024-08-07T14:46:39.367Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-2425 (GCVE-0-2009-2425)
Vulnerability from cvelistv5
Published
2009-07-10 17:00
Modified
2024-08-07 05:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.0.35 allows remote attackers to cause a denial of service (application crash) via a malformed router descriptor.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:52:14.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "35546", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35546" }, { "name": "[or-announce] 20090625 Tor 0.2.0.35 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "name": "tor-router-descriptors-dos(51376)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51376" }, { "name": "55340", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/55340" }, { "name": "ADV-2009-1716", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "name": "35505", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35505" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-06-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.0.35 allows remote attackers to cause a denial of service (application crash) via a malformed router descriptor." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "35546", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35546" }, { "name": "[or-announce] 20090625 Tor 0.2.0.35 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "name": "tor-router-descriptors-dos(51376)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51376" }, { "name": "55340", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/55340" }, { "name": "ADV-2009-1716", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "name": "35505", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35505" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2425", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.0.35 allows remote attackers to cause a denial of service (application crash) via a malformed router descriptor." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35546", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35546" }, { "name": "[or-announce] 20090625 Tor 0.2.0.35 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "name": "tor-router-descriptors-dos(51376)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51376" }, { "name": "55340", "refsource": "OSVDB", "url": "http://www.osvdb.org/55340" }, { "name": "ADV-2009-1716", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "name": "35505", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35505" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2425", "datePublished": "2009-07-10T17:00:00", "dateReserved": "2009-07-10T00:00:00", "dateUpdated": "2024-08-07T05:52:14.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1924 (GCVE-0-2011-1924)
Vulnerability from cvelistv5
Published
2011-06-14 17:00
Modified
2024-08-06 22:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the policy_summarize function in or/policies.c in Tor before 0.2.1.30 allows remote attackers to cause a denial of service (directory authority crash) via a crafted policy that triggers creation of a long port list.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:46:00.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "43548", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43548" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705194" }, { "name": "44862", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44862" }, { "name": "46618", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46618" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e" }, { "name": "FEDORA-2011-7972", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061258.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705192" }, { "name": "[tor-announce] 20110228 Tor 0.2.1.30 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the policy_summarize function in or/policies.c in Tor before 0.2.1.30 allows remote attackers to cause a denial of service (directory authority crash) via a crafted policy that triggers creation of a long port list." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-06-14T17:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "43548", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43548" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705194" }, { "name": "44862", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44862" }, { "name": "46618", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46618" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e" }, { "name": "FEDORA-2011-7972", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061258.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705192" }, { "name": "[tor-announce] 20110228 Tor 0.2.1.30 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1924", "datePublished": "2011-06-14T17:00:00Z", "dateReserved": "2011-05-09T00:00:00Z", "dateUpdated": "2024-08-06T22:46:00.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-5398 (GCVE-0-2008-5398)
Vulnerability from cvelistv5
Published
2008-12-09 00:00
Modified
2024-08-07 10:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.0.32 does not properly process the ClientDNSRejectInternalAddresses configuration option in situations where an exit relay issues a policy-based refusal of a stream, which allows remote exit relays to have an unknown impact by mapping an internal IP address to the destination hostname of a refused stream.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:49:12.389Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "tor-clientdnsreject-security-bypass(47102)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47102" }, { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34583" }, { "name": "32648", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32648" }, { "name": "33025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33025" }, { "name": "ADV-2008-3366", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.0.32 does not properly process the ClientDNSRejectInternalAddresses configuration option in situations where an exit relay issues a policy-based refusal of a stream, which allows remote exit relays to have an unknown impact by mapping an internal IP address to the destination hostname of a refused stream." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "tor-clientdnsreject-security-bypass(47102)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47102" }, { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34583" }, { "name": "32648", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32648" }, { "name": "33025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33025" }, { "name": "ADV-2008-3366", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5398", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.0.32 does not properly process the ClientDNSRejectInternalAddresses configuration option in situations where an exit relay issues a policy-based refusal of a stream, which allows remote exit relays to have an unknown impact by mapping an internal IP address to the destination hostname of a refused stream." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "tor-clientdnsreject-security-bypass(47102)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47102" }, { "name": "34583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34583" }, { "name": "32648", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32648" }, { "name": "33025", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33025" }, { "name": "ADV-2008-3366", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "name": "http://blog.torproject.org/blog/tor-0.2.0.32-released", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "name": "GLSA-200904-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5398", "datePublished": "2008-12-09T00:00:00", "dateReserved": "2008-12-08T00:00:00", "dateUpdated": "2024-08-07T10:49:12.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3408 (GCVE-0-2006-3408)
Vulnerability from cvelistv5
Published
2006-07-07 00:00
Modified
2024-08-07 18:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote attackers to cause an unspecified denial of service via unknown vectors.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.815Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20277" }, { "name": "18323", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/18323" }, { "name": "25883", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25883" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-directory-server-dos(26794)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26794" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote attackers to cause an unspecified denial of service via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20277" }, { "name": "18323", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/18323" }, { "name": "25883", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25883" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-directory-server-dos(26794)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26794" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3408", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote attackers to cause an unspecified denial of service via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20277", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20277" }, { "name": "18323", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18323" }, { "name": "25883", "refsource": "OSVDB", "url": "http://www.osvdb.org/25883" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-directory-server-dos(26794)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26794" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3408", "datePublished": "2006-07-07T00:00:00", "dateReserved": "2006-07-06T00:00:00", "dateUpdated": "2024-08-07T18:30:32.815Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3415 (GCVE-0-2006-3415)
Vulnerability from cvelistv5
Published
2006-07-07 00:00
Modified
2024-09-17 01:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.1.1.20 uses improper logic to validate the "OR" destination, which allows remote attackers to perform a man-in-the-middle (MITM) attack via unspecified vectors.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.870Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25878", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25878" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 uses improper logic to validate the \"OR\" destination, which allows remote attackers to perform a man-in-the-middle (MITM) attack via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25878", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25878" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3415", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.1.20 uses improper logic to validate the \"OR\" destination, which allows remote attackers to perform a man-in-the-middle (MITM) attack via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25878", "refsource": "OSVDB", "url": "http://www.osvdb.org/25878" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3415", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-17T01:21:18.070Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-3165 (GCVE-0-2007-3165)
Vulnerability from cvelistv5
Published
2007-06-11 22:00
Modified
2024-08-07 14:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.1.2.14 can construct circuits in which an entry guard is in the same family as the exit node, which might compromise the anonymity of traffic sources and destinations by exposing traffic to inappropriate remote observers.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:05:29.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25415", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25415" }, { "name": "ADV-2007-1964", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1964" }, { "name": "35670", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/35670" }, { "name": "24180", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24180" }, { "name": "[or-announce] 20070525 Tor 0.1.2.14 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/May-2007/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.14 can construct circuits in which an entry guard is in the same family as the exit node, which might compromise the anonymity of traffic sources and destinations by exposing traffic to inappropriate remote observers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25415", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25415" }, { "name": "ADV-2007-1964", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1964" }, { "name": "35670", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/35670" }, { "name": "24180", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24180" }, { "name": "[or-announce] 20070525 Tor 0.1.2.14 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/May-2007/msg00000.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-3165", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.2.14 can construct circuits in which an entry guard is in the same family as the exit node, which might compromise the anonymity of traffic sources and destinations by exposing traffic to inappropriate remote observers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25415", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25415" }, { "name": "ADV-2007-1964", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1964" }, { "name": "35670", "refsource": "OSVDB", "url": "http://osvdb.org/35670" }, { "name": "24180", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24180" }, { "name": "[or-announce] 20070525 Tor 0.1.2.14 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/May-2007/msg00000.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-3165", "datePublished": "2007-06-11T22:00:00", "dateReserved": "2007-06-11T00:00:00", "dateUpdated": "2024-08-07T14:05:29.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0016 (GCVE-0-2011-0016)
Vulnerability from cvelistv5
Published
2011-01-19 11:00
Modified
2024-08-06 21:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:36:02.377Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "ADV-2011-0131", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "42907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42907" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "1024980", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024980" }, { "name": "ADV-2011-0132", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/2385" }, { "name": "DSA-2148", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2148" }, { "name": "42905", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42905" }, { "name": "[oss-security] 20110118 Re: CVE request: tor", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/18/7" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/2384" }, { "name": "45832", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45832" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-01-22T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "ADV-2011-0131", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "42907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42907" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "1024980", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024980" }, { "name": "ADV-2011-0132", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/2385" }, { "name": "DSA-2148", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2148" }, { "name": "42905", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42905" }, { "name": "[oss-security] 20110118 Re: CVE request: tor", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/18/7" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/2384" }, { "name": "45832", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45832" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0016", "datePublished": "2011-01-19T11:00:00", "dateReserved": "2010-12-07T00:00:00", "dateUpdated": "2024-08-06T21:36:02.377Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0427 (GCVE-0-2011-0427)
Vulnerability from cvelistv5
Published
2011-01-19 11:00
Modified
2024-08-06 21:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "ADV-2011-0131", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "42907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42907" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "1024980", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024980" }, { "name": "tor-unspec-bo(64748)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64748" }, { "name": "ADV-2011-0132", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "name": "DSA-2148", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2148" }, { "name": "42905", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42905" }, { "name": "45832", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45832" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "ADV-2011-0131", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "42907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42907" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "1024980", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024980" }, { "name": "tor-unspec-bo(64748)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64748" }, { "name": "ADV-2011-0132", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "name": "DSA-2148", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2148" }, { "name": "42905", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42905" }, { "name": "45832", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45832" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0427", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "ADV-2011-0131", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "name": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "42907", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42907" }, { "name": "http://blog.torproject.org/blog/tor-02129-released-security-patches", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "1024980", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1024980" }, { "name": "tor-unspec-bo(64748)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64748" }, { "name": "ADV-2011-0132", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "name": "DSA-2148", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2148" }, { "name": "42905", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42905" }, { "name": "45832", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45832" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0427", "datePublished": "2011-01-19T11:00:00", "dateReserved": "2011-01-12T00:00:00", "dateUpdated": "2024-08-06T21:51:08.937Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3409 (GCVE-0-2006-3409)
Vulnerability from cvelistv5
Published
2006-07-07 00:00
Modified
2024-08-07 18:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.902Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20277" }, { "name": "18323", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/18323" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-smartlists-bo(26795)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26795" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20277" }, { "name": "18323", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/18323" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-smartlists-bo(26795)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26795" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3409", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20277", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20277" }, { "name": "18323", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18323" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-smartlists-bo(26795)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26795" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3409", "datePublished": "2006-07-07T00:00:00", "dateReserved": "2006-07-06T00:00:00", "dateUpdated": "2024-08-07T18:30:32.902Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4896 (GCVE-0-2011-4896)
Vulnerability from cvelistv5
Published
2011-12-23 02:00
Modified
2024-09-16 18:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:16:35.183Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.torproject.org/blog/tor-02224-alpha-out" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-12-23T02:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.torproject.org/blog/tor-02224-alpha-out" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4896", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.torproject.org/blog/tor-02224-alpha-out", "refsource": "CONFIRM", "url": "https://blog.torproject.org/blog/tor-02224-alpha-out" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4896", "datePublished": "2011-12-23T02:00:00Z", "dateReserved": "2011-12-22T00:00:00Z", "dateUpdated": "2024-09-16T18:28:19.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4895 (GCVE-0-2011-4895)
Vulnerability from cvelistv5
Published
2011-12-23 02:00
Modified
2024-09-17 01:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:16:35.216Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-12-23T02:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4895", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.torproject.org/blog/tor-02234-released-security-patches", "refsource": "CONFIRM", "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4895", "datePublished": "2011-12-23T02:00:00Z", "dateReserved": "2011-12-22T00:00:00Z", "dateUpdated": "2024-09-17T01:55:32.706Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2778 (GCVE-0-2011-2778)
Vulnerability from cvelistv5
Published
2011-12-23 02:00
Modified
2024-08-06 23:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:15:31.127Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.torproject.org/blog/tor-02235-released-security-patches" }, { "name": "DSA-2363", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2363" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-12-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-19T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.torproject.org/blog/tor-02235-released-security-patches" }, { "name": "DSA-2363", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2363" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-2778", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.torproject.org/blog/tor-02235-released-security-patches", "refsource": "CONFIRM", "url": "https://blog.torproject.org/blog/tor-02235-released-security-patches" }, { "name": "DSA-2363", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2363" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-2778", "datePublished": "2011-12-23T02:00:00", "dateReserved": "2011-07-19T00:00:00", "dateUpdated": "2024-08-06T23:15:31.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-0414 (GCVE-0-2009-0414)
Vulnerability from cvelistv5
Published
2009-02-03 23:00
Modified
2024-08-07 04:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:31:26.160Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2009-0210", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0210" }, { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090122 Tor 0.2.0.33 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2009/msg00000.html" }, { "name": "33677", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33677" }, { "name": "FEDORA-2009-0897", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00902.html" }, { "name": "33399", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33399" }, { "name": "33635", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33635" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.33-stable-released" }, { "name": "1021633", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021633" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-01-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "ADV-2009-0210", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0210" }, { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090122 Tor 0.2.0.33 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2009/msg00000.html" }, { "name": "33677", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33677" }, { "name": "FEDORA-2009-0897", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00902.html" }, { "name": "33399", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33399" }, { "name": "33635", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33635" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.33-stable-released" }, { "name": "1021633", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021633" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0414", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2009-0210", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0210" }, { "name": "34583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090122 Tor 0.2.0.33 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jan-2009/msg00000.html" }, { "name": "33677", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33677" }, { "name": "FEDORA-2009-0897", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00902.html" }, { "name": "33399", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33399" }, { "name": "33635", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33635" }, { "name": "GLSA-200904-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "name": "http://blog.torproject.org/blog/tor-0.2.0.33-stable-released", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-0.2.0.33-stable-released" }, { "name": "1021633", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021633" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0414", "datePublished": "2009-02-03T23:00:00", "dateReserved": "2009-02-03T00:00:00", "dateUpdated": "2024-08-07T04:31:26.160Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-0939 (GCVE-0-2009-0939)
Vulnerability from cvelistv5
Published
2009-03-18 01:00
Modified
2024-08-07 04:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.0.34 treats incomplete IPv4 addresses as valid, which has unknown impact and attack vectors related to "Spec conformance," as demonstrated using 192.168.0.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:57:16.916Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.0.34 treats incomplete IPv4 addresses as valid, which has unknown impact and attack vectors related to \"Spec conformance,\" as demonstrated using 192.168.0." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-04-01T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0939", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.0.34 treats incomplete IPv4 addresses as valid, which has unknown impact and attack vectors related to \"Spec conformance,\" as demonstrated using 192.168.0." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0939", "datePublished": "2009-03-18T01:00:00", "dateReserved": "2009-03-17T00:00:00", "dateUpdated": "2024-08-07T04:57:16.916Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3407 (GCVE-0-2006-3407)
Vulnerability from cvelistv5
Published
2006-07-07 00:00
Modified
2024-08-07 18:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.907Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19795", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19795" }, { "name": "20277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20277" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-log-spoofing(26793)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26793" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19795", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19795" }, { "name": "20277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20277" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-log-spoofing(26793)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26793" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3407", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19795", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19795" }, { "name": "20277", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20277" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "tor-log-spoofing(26793)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26793" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3407", "datePublished": "2006-07-07T00:00:00", "dateReserved": "2006-07-06T00:00:00", "dateUpdated": "2024-08-07T18:30:32.907Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3410 (GCVE-0-2006-3410)
Vulnerability from cvelistv5
Published
2006-07-07 00:00
Modified
2024-08-07 18:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.1.1.20 creates "internal circuits" primarily consisting of nodes with "useful exit nodes," which allows remote attackers to conduct unspecified statistical attacks.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.876Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25882", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25882" }, { "name": "20277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20277" }, { "name": "tor-circuits-information-disclosure(26798)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26798" }, { "name": "18323", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/18323" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 creates \"internal circuits\" primarily consisting of nodes with \"useful exit nodes,\" which allows remote attackers to conduct unspecified statistical attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25882", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25882" }, { "name": "20277", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20277" }, { "name": "tor-circuits-information-disclosure(26798)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26798" }, { "name": "18323", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/18323" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3410", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.1.20 creates \"internal circuits\" primarily consisting of nodes with \"useful exit nodes,\" which allows remote attackers to conduct unspecified statistical attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25882", "refsource": "OSVDB", "url": "http://www.osvdb.org/25882" }, { "name": "20277", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20277" }, { "name": "tor-circuits-information-disclosure(26798)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26798" }, { "name": "18323", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18323" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3410", "datePublished": "2006-07-07T00:00:00", "dateReserved": "2006-07-06T00:00:00", "dateUpdated": "2024-08-07T18:30:32.876Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-3519 (GCVE-0-2012-3519)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-08-06 20:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:05:12.746Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201301-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "name": "50583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50583" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/6537" }, { "name": "openSUSE-SU-2012:1068", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-19T00:00:00", "descriptions": [ { "lang": "en", "value": "routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-10-11T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "GLSA-201301-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "name": "50583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50583" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/6537" }, { "name": "openSUSE-SU-2012:1068", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3519", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201301-03", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "name": "https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "refsource": "MLIST", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "name": "50583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/50583" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "name": "https://trac.torproject.org/projects/tor/ticket/6537", "refsource": "CONFIRM", "url": "https://trac.torproject.org/projects/tor/ticket/6537" }, { "name": "openSUSE-SU-2012:1068", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "name": "https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-3519", "datePublished": "2012-08-26T01:00:00", "dateReserved": "2012-06-14T00:00:00", "dateUpdated": "2024-08-06T20:05:12.746Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2050 (GCVE-0-2005-2050)
Vulnerability from cvelistv5
Published
2005-06-26 04:00
Modified
2024-08-07 22:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unknown vulnerability in Tor before 0.1.0.10 allows remote attackers to read arbitrary memory and possibly key information from the exit server's process space.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:15:36.831Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "15764", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/15764/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jun-2005/msg00001.html" }, { "name": "tor-information-disclosure(21093)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21093" }, { "name": "GLSA-200506-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200506-18.xml" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=96320" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-06-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Tor before 0.1.0.10 allows remote attackers to read arbitrary memory and possibly key information from the exit server\u0027s process space." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "15764", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/15764/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://archives.seul.org/or/announce/Jun-2005/msg00001.html" }, { "name": "tor-information-disclosure(21093)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21093" }, { "name": "GLSA-200506-18", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200506-18.xml" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=96320" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2050", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unknown vulnerability in Tor before 0.1.0.10 allows remote attackers to read arbitrary memory and possibly key information from the exit server\u0027s process space." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "15764", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15764/" }, { "name": "http://archives.seul.org/or/announce/Jun-2005/msg00001.html", "refsource": "MISC", "url": "http://archives.seul.org/or/announce/Jun-2005/msg00001.html" }, { "name": "tor-information-disclosure(21093)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21093" }, { "name": "GLSA-200506-18", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200506-18.xml" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=96320", "refsource": "MISC", "url": "http://bugs.gentoo.org/show_bug.cgi?id=96320" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2050", "datePublished": "2005-06-26T04:00:00", "dateReserved": "2005-06-26T00:00:00", "dateUpdated": "2024-08-07T22:15:36.831Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3412 (GCVE-0-2006-3412)
Vulnerability from cvelistv5
Published
2006-07-07 00:00
Modified
2024-09-17 04:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.895Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25874", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25874" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25874", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25874" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3412", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25874", "refsource": "OSVDB", "url": "http://www.osvdb.org/25874" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3412", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-17T04:24:14.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4096 (GCVE-0-2007-4096)
Vulnerability from cvelistv5
Published
2007-07-30 21:00
Modified
2024-08-07 14:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in Tor before 0.1.2.15, when using BSD natd support, allows remote attackers to cause a denial of service via unspecified vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:39.267Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46968", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/46968" }, { "name": "25035", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Tor before 0.1.2.15, when using BSD natd support, allows remote attackers to cause a denial of service via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "46968", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/46968" }, { "name": "25035", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4096", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Tor before 0.1.2.15, when using BSD natd support, allows remote attackers to cause a denial of service via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46968", "refsource": "OSVDB", "url": "http://osvdb.org/46968" }, { "name": "25035", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4096", "datePublished": "2007-07-30T21:00:00", "dateReserved": "2007-07-30T00:00:00", "dateUpdated": "2024-08-07T14:46:39.267Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0492 (GCVE-0-2011-0492)
Vulnerability from cvelistv5
Published
2011-01-19 11:00
Modified
2024-08-06 21:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:09.078Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-blobs-dos(64867)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64867" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/2326" }, { "name": "45953", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45953" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-blobs-dos(64867)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64867" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/2326" }, { "name": "45953", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45953" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0492", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "http://blog.torproject.org/blog/tor-02129-released-security-patches", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-blobs-dos(64867)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64867" }, { "name": "https://trac.torproject.org/projects/tor/ticket/2326", "refsource": "CONFIRM", "url": "https://trac.torproject.org/projects/tor/ticket/2326" }, { "name": "45953", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45953" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0492", "datePublished": "2011-01-19T11:00:00", "dateReserved": "2011-01-18T00:00:00", "dateUpdated": "2024-08-06T21:51:09.078Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0384 (GCVE-0-2010-0384)
Vulnerability from cvelistv5
Published
2010-01-25 19:00
Modified
2024-09-17 00:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor 0.2.2.x before 0.2.2.7-alpha, when functioning as a directory mirror, does not prevent logging of the client IP address upon detection of erroneous client behavior, which might make it easier for local users to discover the identities of clients in opportunistic circumstances by reading log files.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:45:12.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor 0.2.2.x before 0.2.2.7-alpha, when functioning as a directory mirror, does not prevent logging of the client IP address upon detection of erroneous client behavior, which might make it easier for local users to discover the identities of clients in opportunistic circumstances by reading log files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-01-25T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0384", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor 0.2.2.x before 0.2.2.7-alpha, when functioning as a directory mirror, does not prevent logging of the client IP address upon detection of erroneous client behavior, which might make it easier for local users to discover the identities of clients in opportunistic circumstances by reading log files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "refsource": "MLIST", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-0384", "datePublished": "2010-01-25T19:00:00Z", "dateReserved": "2010-01-25T00:00:00Z", "dateUpdated": "2024-09-17T00:15:38.157Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0015 (GCVE-0-2011-0015)
Vulnerability from cvelistv5
Published
2011-01-19 11:00
Modified
2024-08-06 21:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:36:02.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "ADV-2011-0131", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "name": "42907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42907" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "1024980", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1024980" }, { "name": "ADV-2011-0132", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "name": "DSA-2148", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2148" }, { "name": "42905", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42905" }, { "name": "[oss-security] 20110118 Re: CVE request: tor", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/18/7" }, { "name": "45832", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45832" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-01-22T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "ADV-2011-0131", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "name": "42907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42907" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "1024980", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1024980" }, { "name": "ADV-2011-0132", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "name": "DSA-2148", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2148" }, { "name": "42905", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42905" }, { "name": "[oss-security] 20110118 Re: CVE request: tor", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/01/18/7" }, { "name": "45832", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45832" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-0015", "datePublished": "2011-01-19T11:00:00", "dateReserved": "2010-12-07T00:00:00", "dateUpdated": "2024-08-06T21:36:02.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-4508 (GCVE-0-2006-4508)
Vulnerability from cvelistv5
Published
2006-08-31 23:00
Modified
2024-08-07 19:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service (flood) via unspecified vectors.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:14:47.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "21725", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21725" }, { "name": "19785", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19785" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.scatterchat.com/advisories/2006-02_tech.html" }, { "name": "[or-announce] 20060829 Tor security advisory: clients will route traffic", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Aug-2006/msg00001.html" }, { "name": "tor-trafficrouting-dos(28686)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28686" }, { "name": "21708", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21708" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-08-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service (flood) via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "21725", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21725" }, { "name": "19785", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19785" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.scatterchat.com/advisories/2006-02_tech.html" }, { "name": "[or-announce] 20060829 Tor security advisory: clients will route traffic", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Aug-2006/msg00001.html" }, { "name": "tor-trafficrouting-dos(28686)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28686" }, { "name": "21708", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21708" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4508", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service (flood) via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "21725", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21725" }, { "name": "19785", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19785" }, { "name": "http://www.scatterchat.com/advisories/2006-02_tech.html", "refsource": "CONFIRM", "url": "http://www.scatterchat.com/advisories/2006-02_tech.html" }, { "name": "[or-announce] 20060829 Tor security advisory: clients will route traffic", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Aug-2006/msg00001.html" }, { "name": "tor-trafficrouting-dos(28686)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28686" }, { "name": "21708", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21708" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4508", "datePublished": "2006-08-31T23:00:00", "dateReserved": "2006-08-31T00:00:00", "dateUpdated": "2024-08-07T19:14:47.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0490 (GCVE-0-2011-0490)
Vulnerability from cvelistv5
Published
2011-01-19 11:00
Modified
2024-08-06 21:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:08.860Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-libevent-dos(64889)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64889" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/2190" }, { "name": "45953", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45953" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-libevent-dos(64889)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64889" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/2190" }, { "name": "45953", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45953" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0490", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "http://blog.torproject.org/blog/tor-02129-released-security-patches", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-libevent-dos(64889)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64889" }, { "name": "https://trac.torproject.org/projects/tor/ticket/2190", "refsource": "CONFIRM", "url": "https://trac.torproject.org/projects/tor/ticket/2190" }, { "name": "45953", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45953" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0490", "datePublished": "2011-01-19T11:00:00", "dateReserved": "2011-01-18T00:00:00", "dateUpdated": "2024-08-06T21:51:08.860Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4897 (GCVE-0-2011-4897)
Vulnerability from cvelistv5
Published
2011-12-23 02:00
Modified
2024-09-16 16:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:16:35.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.torproject.org/blog/tor-02225-alpha-out" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-12-23T02:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.torproject.org/blog/tor-02225-alpha-out" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4897", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.torproject.org/blog/tor-02225-alpha-out", "refsource": "CONFIRM", "url": "https://blog.torproject.org/blog/tor-02225-alpha-out" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4897", "datePublished": "2011-12-23T02:00:00Z", "dateReserved": "2011-12-22T00:00:00Z", "dateUpdated": "2024-09-16T16:53:14.667Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0493 (GCVE-0-2011-0493)
Vulnerability from cvelistv5
Published
2011-01-19 11:00
Modified
2024-08-06 21:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:58:24.443Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/2352" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-routercache-dos(64864)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64864" }, { "name": "45953", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45953" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/2352" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-routercache-dos(64864)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64864" }, { "name": "45953", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45953" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0493", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "https://trac.torproject.org/projects/tor/ticket/2352", "refsource": "CONFIRM", "url": "https://trac.torproject.org/projects/tor/ticket/2352" }, { "name": "http://blog.torproject.org/blog/tor-02129-released-security-patches", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-routercache-dos(64864)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64864" }, { "name": "45953", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45953" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0493", "datePublished": "2011-01-19T11:00:00", "dateReserved": "2011-01-18T00:00:00", "dateUpdated": "2024-08-06T21:58:24.443Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3413 (GCVE-0-2006-3413)
Vulnerability from cvelistv5
Published
2006-07-07 00:00
Modified
2024-09-17 01:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The privoxy configuration file in Tor before 0.1.1.20, when run on Apple OS X, logs all data via the "logfile", which allows attackers to obtain potentially sensitive information.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.887Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25875", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25875" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The privoxy configuration file in Tor before 0.1.1.20, when run on Apple OS X, logs all data via the \"logfile\", which allows attackers to obtain potentially sensitive information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25875", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25875" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3413", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The privoxy configuration file in Tor before 0.1.1.20, when run on Apple OS X, logs all data via the \"logfile\", which allows attackers to obtain potentially sensitive information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25875", "refsource": "OSVDB", "url": "http://www.osvdb.org/25875" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3413", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-17T01:35:51.512Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-3518 (GCVE-0-2012-3518)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-08-06 20:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:05:12.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201301-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "name": "50583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50583" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546" }, { "name": "openSUSE-SU-2012:1068", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/6530" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-19T00:00:00", "descriptions": [ { "lang": "en", "value": "The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-10-11T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "GLSA-201301-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "name": "50583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50583" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546" }, { "name": "openSUSE-SU-2012:1068", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/6530" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3518", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201301-03", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "refsource": "MLIST", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "name": "50583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/50583" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "name": "https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546" }, { "name": "openSUSE-SU-2012:1068", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "name": "https://trac.torproject.org/projects/tor/ticket/6530", "refsource": "CONFIRM", "url": "https://trac.torproject.org/projects/tor/ticket/6530" }, { "name": "https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-3518", "datePublished": "2012-08-26T01:00:00", "dateReserved": "2012-06-14T00:00:00", "dateUpdated": "2024-08-06T20:05:12.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3417 (GCVE-0-2006-3417)
Vulnerability from cvelistv5
Published
2006-07-07 00:00
Modified
2024-09-17 03:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote attackers to be preferred over nodes that are identified as more trustworthy "entry guard" (is_guard) systems by directory authorities.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.807Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25879", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25879" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote attackers to be preferred over nodes that are identified as more trustworthy \"entry guard\" (is_guard) systems by directory authorities." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25879", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25879" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3417", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote attackers to be preferred over nodes that are identified as more trustworthy \"entry guard\" (is_guard) systems by directory authorities." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25879", "refsource": "OSVDB", "url": "http://www.osvdb.org/25879" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3417", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-17T03:49:22.492Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2768 (GCVE-0-2011-2768)
Vulnerability from cvelistv5
Published
2011-12-23 02:00
Modified
2024-08-06 23:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:15:30.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "name": "DSA-2331", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-19T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "name": "DSA-2331", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-2768", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.torproject.org/blog/tor-02234-released-security-patches", "refsource": "CONFIRM", "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "name": "DSA-2331", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2331" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-2768", "datePublished": "2011-12-23T02:00:00", "dateReserved": "2011-07-19T00:00:00", "dateUpdated": "2024-08-06T23:15:30.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-6893 (GCVE-0-2006-6893)
Vulnerability from cvelistv5
Published
2007-01-08 20:00
Modified
2024-09-17 04:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor allows remote attackers to discover the IP address of a hidden service by accessing this service at a high rate, thereby changing the server's CPU temperature and consequently changing the pattern of time values visible through (1) ICMP timestamps, (2) TCP sequence numbers, and (3) TCP timestamps, a different vulnerability than CVE-2006-0414. NOTE: it could be argued that this is a laws-of-physics vulnerability that is a fundamental design limitation of certain hardware implementations, so perhaps this issue should not be included in CVE.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:42:07.539Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor allows remote attackers to discover the IP address of a hidden service by accessing this service at a high rate, thereby changing the server\u0027s CPU temperature and consequently changing the pattern of time values visible through (1) ICMP timestamps, (2) TCP sequence numbers, and (3) TCP timestamps, a different vulnerability than CVE-2006-0414. NOTE: it could be argued that this is a laws-of-physics vulnerability that is a fundamental design limitation of certain hardware implementations, so perhaps this issue should not be included in CVE." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-01-08T20:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-6893", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor allows remote attackers to discover the IP address of a hidden service by accessing this service at a high rate, thereby changing the server\u0027s CPU temperature and consequently changing the pattern of time values visible through (1) ICMP timestamps, (2) TCP sequence numbers, and (3) TCP timestamps, a different vulnerability than CVE-2006-0414. NOTE: it could be argued that this is a laws-of-physics vulnerability that is a fundamental design limitation of certain hardware implementations, so perhaps this issue should not be included in CVE." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html", "refsource": "MISC", "url": "http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html" }, { "name": "http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/", "refsource": "MISC", "url": "http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/" }, { "name": "http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf", "refsource": "MISC", "url": "http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-6893", "datePublished": "2007-01-08T20:00:00Z", "dateReserved": "2007-01-08T00:00:00Z", "dateUpdated": "2024-09-17T04:24:29.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-3517 (GCVE-0-2012-3517)
Vulnerability from cvelistv5
Published
2012-08-26 01:00
Modified
2024-08-06 20:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests.
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:05:12.774Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "GLSA-201301-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849949" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "name": "openSUSE-SU-2012:1068", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/6480" }, { "name": "FEDORA-2012-14638", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-08-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-10-11T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "GLSA-201301-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849949" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "name": "openSUSE-SU-2012:1068", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/6480" }, { "name": "FEDORA-2012-14638", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3517", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "GLSA-201301-03", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=849949", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849949" }, { "name": "[tor-announce] 20120819 Tor 0.2.2.38 is released", "refsource": "MLIST", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "name": "https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c" }, { "name": "[oss-security] 20120821 Re: CVE Request -- Tor 0.2.2.38: Three issues", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "name": "openSUSE-SU-2012:1068", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "name": "https://trac.torproject.org/projects/tor/ticket/6480", "refsource": "CONFIRM", "url": "https://trac.torproject.org/projects/tor/ticket/6480" }, { "name": "FEDORA-2012-14638", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-3517", "datePublished": "2012-08-26T01:00:00", "dateReserved": "2012-06-14T00:00:00", "dateUpdated": "2024-08-06T20:05:12.774Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3419 (GCVE-0-2006-3419)
Vulnerability from cvelistv5
Published
2006-07-07 00:00
Modified
2024-09-17 00:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:33.376Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25880", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25880" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25880", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25880" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3419", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25880", "refsource": "OSVDB", "url": "http://www.osvdb.org/25880" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3419", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-17T00:51:25.809Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0383 (GCVE-0-2010-0383)
Vulnerability from cvelistv5
Published
2010-01-25 19:00
Modified
2024-08-07 00:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:45:12.236Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37901", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37901" }, { "name": "61977", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/61977" }, { "name": "[or-announce] 20100121 Tor 0.2.1.22 is released (security fix)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "name": "38198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38198" }, { "name": "[or-talk] 20100120 Tor Project infrastructure updates in response to security breach", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00161.html" }, { "name": "[or-talk] 20100120 Re: Tor Project infrastructure updates in response to security breach", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00165.html" }, { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-02-05T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "37901", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37901" }, { "name": "61977", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/61977" }, { "name": "[or-announce] 20100121 Tor 0.2.1.22 is released (security fix)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "name": "38198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38198" }, { "name": "[or-talk] 20100120 Tor Project infrastructure updates in response to security breach", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00161.html" }, { "name": "[or-talk] 20100120 Re: Tor Project infrastructure updates in response to security breach", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00165.html" }, { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0383", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37901", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37901" }, { "name": "61977", "refsource": "OSVDB", "url": "http://osvdb.org/61977" }, { "name": "[or-announce] 20100121 Tor 0.2.1.22 is released (security fix)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "name": "38198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38198" }, { "name": "[or-talk] 20100120 Tor Project infrastructure updates in response to security breach", "refsource": "MLIST", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00161.html" }, { "name": "[or-talk] 20100120 Re: Tor Project infrastructure updates in response to security breach", "refsource": "MLIST", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00165.html" }, { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "refsource": "MLIST", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-0383", "datePublished": "2010-01-25T19:00:00", "dateReserved": "2010-01-25T00:00:00", "dateUpdated": "2024-08-07T00:45:12.236Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-0936 (GCVE-0-2009-0936)
Vulnerability from cvelistv5
Published
2009-03-18 01:00
Modified
2024-08-07 04:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in Tor before 0.2.0.34 allows attackers to cause a denial of service (infinite loop) via "corrupt votes."
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:57:16.420Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows attackers to cause a denial of service (infinite loop) via \"corrupt votes.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-04-01T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0936", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows attackers to cause a denial of service (infinite loop) via \"corrupt votes.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0936", "datePublished": "2009-03-18T01:00:00", "dateReserved": "2009-03-17T00:00:00", "dateUpdated": "2024-08-07T04:57:16.420Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4894 (GCVE-0-2011-4894)
Vulnerability from cvelistv5
Published
2011-12-23 02:00
Modified
2024-09-16 20:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by observing DirPort connections.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:16:35.161Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by observing DirPort connections." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-12-23T02:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4894", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by observing DirPort connections." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.torproject.org/blog/tor-02234-released-security-patches", "refsource": "CONFIRM", "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4894", "datePublished": "2011-12-23T02:00:00Z", "dateReserved": "2011-12-22T00:00:00Z", "dateUpdated": "2024-09-16T20:48:21.454Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4099 (GCVE-0-2007-4099)
Vulnerability from cvelistv5
Published
2007-07-30 21:00
Modified
2024-08-07 14:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.1.2.15 can select a guard node beyond the first listed never-before-connected-to guard node, which allows remote attackers with control of certain guard nodes to obtain sensitive information and possibly leverage further attacks.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:39.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46971", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/46971" }, { "name": "25035", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.15 can select a guard node beyond the first listed never-before-connected-to guard node, which allows remote attackers with control of certain guard nodes to obtain sensitive information and possibly leverage further attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "46971", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/46971" }, { "name": "25035", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4099", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.2.15 can select a guard node beyond the first listed never-before-connected-to guard node, which allows remote attackers with control of certain guard nodes to obtain sensitive information and possibly leverage further attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46971", "refsource": "OSVDB", "url": "http://osvdb.org/46971" }, { "name": "25035", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4099", "datePublished": "2007-07-30T21:00:00", "dateReserved": "2007-07-30T00:00:00", "dateUpdated": "2024-08-07T14:46:39.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-2769 (GCVE-0-2011-2769)
Vulnerability from cvelistv5
Published
2011-12-23 02:00
Modified
2024-08-06 23:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:15:30.687Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "name": "DSA-2331", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-01-19T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "name": "DSA-2331", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-2769", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://blog.torproject.org/blog/tor-02234-released-security-patches", "refsource": "CONFIRM", "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "name": "DSA-2331", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2331" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-2769", "datePublished": "2011-12-23T02:00:00", "dateReserved": "2011-07-19T00:00:00", "dateUpdated": "2024-08-06T23:15:30.687Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-0937 (GCVE-0-2009-0937)
Vulnerability from cvelistv5
Published
2009-03-18 01:00
Modified
2024-08-07 04:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service via unknown vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:57:16.638Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-04-01T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0937", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34583" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0937", "datePublished": "2009-03-18T01:00:00", "dateReserved": "2009-03-17T00:00:00", "dateUpdated": "2024-08-07T04:57:16.638Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-0938 (GCVE-0-2009-0938)
Vulnerability from cvelistv5
Published
2009-03-18 01:00
Modified
2024-08-07 04:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service (exit node crash) via "malformed input."
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:57:16.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34583" }, { "name": "tor-mirrors-dos(49323)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49323" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-02-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service (exit node crash) via \"malformed input.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34583" }, { "name": "tor-mirrors-dos(49323)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49323" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0938", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service (exit node crash) via \"malformed input.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34583" }, { "name": "tor-mirrors-dos(49323)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49323" }, { "name": "[or-announce] 20090209 Tor 0.2.0.34 is released (security fixes)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "name": "33880", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33880" }, { "name": "33713", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33713" }, { "name": "GLSA-200904-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0938", "datePublished": "2009-03-18T01:00:00", "dateReserved": "2009-03-17T00:00:00", "dateUpdated": "2024-08-07T04:57:16.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2643 (GCVE-0-2005-2643)
Vulnerability from cvelistv5
Published
2005-08-21 04:00
Modified
2024-08-07 22:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:45:01.889Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "16424", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16424" }, { "name": "[or-announce] 20050811 Tor security advisory: DH handshake flaw", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Aug-2005/msg00002.html" }, { "name": "20050819 Fwd: Tor security advisory: DH handshake flaw", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112448002732443\u0026w=2" }, { "name": "1014739", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1014739" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-08-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "16424", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16424" }, { "name": "[or-announce] 20050811 Tor security advisory: DH handshake flaw", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Aug-2005/msg00002.html" }, { "name": "20050819 Fwd: Tor security advisory: DH handshake flaw", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=112448002732443\u0026w=2" }, { "name": "1014739", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1014739" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2643", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "16424", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16424" }, { "name": "[or-announce] 20050811 Tor security advisory: DH handshake flaw", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Aug-2005/msg00002.html" }, { "name": "20050819 Fwd: Tor security advisory: DH handshake flaw", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=112448002732443\u0026w=2" }, { "name": "1014739", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1014739" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2643", "datePublished": "2005-08-21T04:00:00", "dateReserved": "2005-08-21T00:00:00", "dateUpdated": "2024-08-07T22:45:01.889Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-2426 (GCVE-0-2009-2426)
Vulnerability from cvelistv5
Published
2009-07-10 17:00
Modified
2024-08-07 05:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0.35 and 0.1.x before 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an internal IP address via unknown vectors. NOTE: some of these details are obtained from third party information.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:52:14.789Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "35546", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35546" }, { "name": "[or-announce] 20090625 Tor 0.2.0.35 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "name": "tor-connectionedge-spoofing(51377)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51377" }, { "name": "ADV-2009-1716", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "name": "35505", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35505" }, { "name": "55341", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/55341" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-06-25T00:00:00", "descriptions": [ { "lang": "en", "value": "The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0.35 and 0.1.x before 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an internal IP address via unknown vectors. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "35546", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35546" }, { "name": "[or-announce] 20090625 Tor 0.2.0.35 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "name": "tor-connectionedge-spoofing(51377)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51377" }, { "name": "ADV-2009-1716", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "name": "35505", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35505" }, { "name": "55341", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/55341" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2426", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0.35 and 0.1.x before 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an internal IP address via unknown vectors. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "35546", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35546" }, { "name": "[or-announce] 20090625 Tor 0.2.0.35 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "name": "tor-connectionedge-spoofing(51377)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51377" }, { "name": "ADV-2009-1716", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "name": "35505", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35505" }, { "name": "55341", "refsource": "OSVDB", "url": "http://www.osvdb.org/55341" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2426", "datePublished": "2009-07-10T17:00:00", "dateReserved": "2009-07-10T00:00:00", "dateUpdated": "2024-08-07T05:52:14.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-0491 (GCVE-0-2011-0491)
Vulnerability from cvelistv5
Published
2011-01-19 11:00
Modified
2024-08-06 21:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to "underflow errors."
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:51:09.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-torrealloc-dos(64888)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64888" }, { "name": "45953", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45953" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to \"underflow errors.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-torrealloc-dos(64888)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64888" }, { "name": "45953", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45953" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-0491", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to \"underflow errors.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[or-announce] 20110117 Tor 0.2.1.29 is released (security patches)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "name": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "name": "https://trac.torproject.org/projects/tor/ticket/2324", "refsource": "CONFIRM", "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "name": "http://blog.torproject.org/blog/tor-02129-released-security-patches", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "name": "tor-torrealloc-dos(64888)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64888" }, { "name": "45953", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45953" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-0491", "datePublished": "2011-01-19T11:00:00", "dateReserved": "2011-01-18T00:00:00", "dateUpdated": "2024-08-06T21:51:09.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3414 (GCVE-0-2006-3414)
Vulnerability from cvelistv5
Published
2006-07-07 00:00
Modified
2024-09-16 23:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.1.1.20 supports server descriptors that contain hostnames instead of IP addresses, which allows remote attackers to arbitrarily group users by providing preferential address resolution.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25877", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25877" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 supports server descriptors that contain hostnames instead of IP addresses, which allows remote attackers to arbitrarily group users by providing preferential address resolution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25877", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25877" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3414", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.1.20 supports server descriptors that contain hostnames instead of IP addresses, which allows remote attackers to arbitrarily group users by providing preferential address resolution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "25877", "refsource": "OSVDB", "url": "http://www.osvdb.org/25877" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3414", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-16T23:55:56.346Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4097 (GCVE-0-2007-4097)
Vulnerability from cvelistv5
Published
2007-07-30 21:00
Modified
2024-08-07 14:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.1.2.15 sends "destroy cells" containing the reason for tearing down a circuit, which allows remote attackers to obtain sensitive information, contrary to specifications.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:39.349Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46969", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/46969" }, { "name": "25035", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.15 sends \"destroy cells\" containing the reason for tearing down a circuit, which allows remote attackers to obtain sensitive information, contrary to specifications." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "46969", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/46969" }, { "name": "25035", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4097", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.2.15 sends \"destroy cells\" containing the reason for tearing down a circuit, which allows remote attackers to obtain sensitive information, contrary to specifications." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "46969", "refsource": "OSVDB", "url": "http://osvdb.org/46969" }, { "name": "25035", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26140" }, { "name": "ADV-2007-2634", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4097", "datePublished": "2007-07-30T21:00:00", "dateReserved": "2007-07-30T00:00:00", "dateUpdated": "2024-08-07T14:46:39.349Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3418 (GCVE-0-2006-3418)
Vulnerability from cvelistv5
Published
2006-07-07 00:00
Modified
2024-09-17 00:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.1.1.20 does not validate that a server descriptor's fingerprint line matches its identity key, which allows remote attackers to spoof the fingerprint line, which might be trusted by users or other applications.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:33.523Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25881", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25881" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 does not validate that a server descriptor\u0027s fingerprint line matches its identity key, which allows remote attackers to spoof the fingerprint line, which might be trusted by users or other applications." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25881", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25881" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3418", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.1.20 does not validate that a server descriptor\u0027s fingerprint line matches its identity key, which allows remote attackers to spoof the fingerprint line, which might be trusted by users or other applications." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25881", "refsource": "OSVDB", "url": "http://www.osvdb.org/25881" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3418", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-17T00:52:27.267Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-0414 (GCVE-0-2006-0414)
Vulnerability from cvelistv5
Published
2006-01-25 11:00
Modified
2024-08-07 16:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:34:14.515Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19795", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19795" }, { "name": "18576", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18576" }, { "name": "tor-service-information-disclosure(24285)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24285" }, { "name": "18323", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/18323" }, { "name": "22689", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/22689" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2006/msg00001.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19795", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19795" }, { "name": "18576", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18576" }, { "name": "tor-service-information-disclosure(24285)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24285" }, { "name": "18323", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/18323" }, { "name": "22689", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/22689" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://archives.seul.org/or/announce/Jan-2006/msg00001.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-0414", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19795", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19795" }, { "name": "18576", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18576" }, { "name": "tor-service-information-disclosure(24285)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24285" }, { "name": "18323", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18323" }, { "name": "22689", "refsource": "OSVDB", "url": "http://www.osvdb.org/22689" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "name": "http://archives.seul.org/or/announce/Jan-2006/msg00001.html", "refsource": "CONFIRM", "url": "http://archives.seul.org/or/announce/Jan-2006/msg00001.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-0414", "datePublished": "2006-01-25T11:00:00", "dateReserved": "2006-01-25T00:00:00", "dateUpdated": "2024-08-07T16:34:14.515Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3411 (GCVE-0-2006-3411)
Vulnerability from cvelistv5
Published
2006-07-07 00:00
Modified
2024-09-16 21:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:32.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25876", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25876" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25876", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25876" }, { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3411", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25876", "refsource": "OSVDB", "url": "http://www.osvdb.org/25876" }, { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3411", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-16T21:02:25.720Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2009-0654 (GCVE-0-2009-0654)
Vulnerability from cvelistv5
Published
2009-02-20 19:00
Modified
2024-09-17 03:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router. NOTE: the vendor disputes the significance of this issue, noting that the product's design "accepted end-to-end correlation as an attack that is too expensive to solve."
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:40:05.357Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.torproject.org/blog/one-cell-enough" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router. NOTE: the vendor disputes the significance of this issue, noting that the product\u0027s design \"accepted end-to-end correlation as an attack that is too expensive to solve.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-02-20T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.torproject.org/blog/one-cell-enough" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0654", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router. NOTE: the vendor disputes the significance of this issue, noting that the product\u0027s design \"accepted end-to-end correlation as an attack that is too expensive to solve.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf", "refsource": "MISC", "url": "http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf" }, { "name": "http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu", "refsource": "MISC", "url": "http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu" }, { "name": "http://blog.torproject.org/blog/one-cell-enough", "refsource": "MISC", "url": "http://blog.torproject.org/blog/one-cell-enough" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0654", "datePublished": "2009-02-20T19:00:00Z", "dateReserved": "2009-02-20T00:00:00Z", "dateUpdated": "2024-09-17T03:13:48.226Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-3416 (GCVE-0-2006-3416)
Vulnerability from cvelistv5
Published
2006-07-07 00:00
Modified
2024-09-17 04:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.1.1.20 kills the circuit when it receives an unrecognized relay command, which causes network circuits to be disbanded. NOTE: while this item is listed under the "Security fixes" section of the developer changelog, the developer clarified on 20060707 that this is only a self-DoS. Therefore this issue should not be included in CVE
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:33.324Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 kills the circuit when it receives an unrecognized relay command, which causes network circuits to be disbanded. NOTE: while this item is listed under the \"Security fixes\" section of the developer changelog, the developer clarified on 20060707 that this is only a self-DoS. Therefore this issue should not be included in CVE" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2006-07-07T00:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20514", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3416", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** Tor before 0.1.1.20 kills the circuit when it receives an unrecognized relay command, which causes network circuits to be disbanded. NOTE: while this item is listed under the \"Security fixes\" section of the developer changelog, the developer clarified on 20060707 that this is only a self-DoS. Therefore this issue should not be included in CVE." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20514", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20514" }, { "name": "GLSA-200606-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "name": "http://tor.eff.org/cvs/tor/ChangeLog", "refsource": "CONFIRM", "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3416", "datePublished": "2006-07-07T00:00:00Z", "dateReserved": "2006-07-06T00:00:00Z", "dateUpdated": "2024-09-17T04:18:47.715Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-1103 (GCVE-0-2007-1103)
Vulnerability from cvelistv5
Published
2007-02-26 17:00
Modified
2024-08-07 12:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor does not verify a node's uptime and bandwidth advertisements, which allows remote attackers who operate a low resource node to make false claims of greater resources, which places the node into use for many circuits and compromises the anonymity of traffic sources and destinations.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:43:22.579Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[or-talk] 20070225 \"Low-Resource Routing Attacks Against Anonymous Systems\"", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/talk/Feb-2007/msg00197.html" }, { "name": "[or-talk] 20070225 Re: ISP controlling entry/exti (\"Low-Resource Routing Attacks Against Anonymous Systems\")", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/talk/Feb-2007/msg00202.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf" }, { "name": "[or-talk] 20070225 Re: \"Low-Resource Routing Attacks Against Anonymous Systems\"", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/talk/Feb-2007/msg00200.html" }, { "name": "45249", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/45249" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-02-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor does not verify a node\u0027s uptime and bandwidth advertisements, which allows remote attackers who operate a low resource node to make false claims of greater resources, which places the node into use for many circuits and compromises the anonymity of traffic sources and destinations." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[or-talk] 20070225 \"Low-Resource Routing Attacks Against Anonymous Systems\"", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/talk/Feb-2007/msg00197.html" }, { "name": "[or-talk] 20070225 Re: ISP controlling entry/exti (\"Low-Resource Routing Attacks Against Anonymous Systems\")", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/talk/Feb-2007/msg00202.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf" }, { "name": "[or-talk] 20070225 Re: \"Low-Resource Routing Attacks Against Anonymous Systems\"", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/talk/Feb-2007/msg00200.html" }, { "name": "45249", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/45249" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1103", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor does not verify a node\u0027s uptime and bandwidth advertisements, which allows remote attackers who operate a low resource node to make false claims of greater resources, which places the node into use for many circuits and compromises the anonymity of traffic sources and destinations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[or-talk] 20070225 \"Low-Resource Routing Attacks Against Anonymous Systems\"", "refsource": "MLIST", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00197.html" }, { "name": "[or-talk] 20070225 Re: ISP controlling entry/exti (\"Low-Resource Routing Attacks Against Anonymous Systems\")", "refsource": "MLIST", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00202.html" }, { "name": "http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf", "refsource": "MISC", "url": "http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf" }, { "name": "[or-talk] 20070225 Re: \"Low-Resource Routing Attacks Against Anonymous Systems\"", "refsource": "MLIST", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00200.html" }, { "name": "45249", "refsource": "OSVDB", "url": "http://osvdb.org/45249" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1103", "datePublished": "2007-02-26T17:00:00", "dateReserved": "2007-02-26T00:00:00", "dateUpdated": "2024-08-07T12:43:22.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0385 (GCVE-0-2010-0385)
Vulnerability from cvelistv5
Published
2010-01-25 19:00
Modified
2024-09-16 17:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:45:12.159Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "37901", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/37901" }, { "name": "61865", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/61865" }, { "name": "[or-announce] 20100121 Tor 0.2.1.22 is released (security fix)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "name": "38198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38198" }, { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2010-01-25T19:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "37901", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/37901" }, { "name": "61865", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/61865" }, { "name": "[or-announce] 20100121 Tor 0.2.1.22 is released (security fix)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "name": "38198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38198" }, { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0385", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "37901", "refsource": "BID", "url": "http://www.securityfocus.com/bid/37901" }, { "name": "61865", "refsource": "OSVDB", "url": "http://www.osvdb.org/61865" }, { "name": "[or-announce] 20100121 Tor 0.2.1.22 is released (security fix)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "name": "38198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38198" }, { "name": "[or-talk] 20100120 Tor 0.2.2.7-alpha is out", "refsource": "MLIST", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-0385", "datePublished": "2010-01-25T19:00:00Z", "dateReserved": "2010-01-25T00:00:00Z", "dateUpdated": "2024-09-16T17:22:56.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-5397 (GCVE-0-2008-5397)
Vulnerability from cvelistv5
Published
2008-12-09 00:00
Modified
2024-08-07 10:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.2.0.32 does not properly process the (1) User and (2) Group configuration options, which might allow local users to gain privileges by leveraging unintended supplementary group memberships of the Tor process.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:49:12.620Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34583" }, { "name": "32648", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/32648" }, { "name": "33025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/33025" }, { "name": "ADV-2008-3366", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "name": "tor-user-privilege-escalation(47101)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47101" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-12-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.2.0.32 does not properly process the (1) User and (2) Group configuration options, which might allow local users to gain privileges by leveraging unintended supplementary group memberships of the Tor process." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "34583", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34583" }, { "name": "32648", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/32648" }, { "name": "33025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/33025" }, { "name": "ADV-2008-3366", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "name": "tor-user-privilege-escalation(47101)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47101" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "name": "GLSA-200904-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-5397", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.2.0.32 does not properly process the (1) User and (2) Group configuration options, which might allow local users to gain privileges by leveraging unintended supplementary group memberships of the Tor process." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "34583", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34583" }, { "name": "32648", "refsource": "BID", "url": "http://www.securityfocus.com/bid/32648" }, { "name": "33025", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/33025" }, { "name": "ADV-2008-3366", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "name": "tor-user-privilege-escalation(47101)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47101" }, { "name": "http://blog.torproject.org/blog/tor-0.2.0.32-released", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "name": "GLSA-200904-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-5397", "datePublished": "2008-12-09T00:00:00", "dateReserved": "2008-12-08T00:00:00", "dateUpdated": "2024-08-07T10:49:12.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-4098 (GCVE-0-2007-4098)
Vulnerability from cvelistv5
Published
2007-07-30 21:00
Modified
2024-08-07 14:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Tor before 0.1.2.15 does not properly distinguish "streamids from different exits," which might allow remote attackers with control over Tor routers to inject cells into arbitrary streams.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T14:46:38.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "25035", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26140" }, { "name": "46970", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/46970" }, { "name": "ADV-2007-2634", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-07-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.15 does not properly distinguish \"streamids from different exits,\" which might allow remote attackers with control over Tor routers to inject cells into arbitrary streams." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "25035", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26140" }, { "name": "46970", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/46970" }, { "name": "ADV-2007-2634", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-4098", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Tor before 0.1.2.15 does not properly distinguish \"streamids from different exits,\" which might allow remote attackers with control over Tor routers to inject cells into arbitrary streams." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "25035", "refsource": "BID", "url": "http://www.securityfocus.com/bid/25035" }, { "name": "26140", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26140" }, { "name": "46970", "refsource": "OSVDB", "url": "http://osvdb.org/46970" }, { "name": "ADV-2007-2634", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "name": "[or-announce] 20070723 Tor 0.1.2.15 is released", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-4098", "datePublished": "2007-07-30T21:00:00", "dateReserved": "2007-07-30T00:00:00", "dateUpdated": "2024-08-07T14:46:38.593Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1676 (GCVE-0-2010-1676)
Vulnerability from cvelistv5
Published
2010-12-22 00:00
Modified
2024-08-07 01:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:35:53.702Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02128-released-security-patches" }, { "name": "42667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42667" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches" }, { "name": "1024910", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1024910" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog" }, { "name": "ADV-2011-0114", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0114" }, { "name": "[or-announce] 20101220 Tor 0.2.1.28 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.seul.org/or/announce/Dec-2010/msg00000.html" }, { "name": "ADV-2010-3290", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3290" }, { "name": "GLSA-201101-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201101-02.xml" }, { "name": "45500", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/45500" }, { "name": "42916", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42916" }, { "name": "42783", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42783" }, { "name": "42536", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42536" }, { "name": "FEDORA-2010-19159", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html" }, { "name": "DSA-2136", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-2136" }, { "name": "FEDORA-2010-19147", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-01-12T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02128-released-security-patches" }, { "name": "42667", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42667" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches" }, { "name": "1024910", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1024910" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog" }, { "name": "ADV-2011-0114", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0114" }, { "name": "[or-announce] 20101220 Tor 0.2.1.28 is released (security patches)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.seul.org/or/announce/Dec-2010/msg00000.html" }, { "name": "ADV-2010-3290", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3290" }, { "name": "GLSA-201101-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201101-02.xml" }, { "name": "45500", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/45500" }, { "name": "42916", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42916" }, { "name": "42783", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42783" }, { "name": "42536", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42536" }, { "name": "FEDORA-2010-19159", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html" }, { "name": "DSA-2136", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-2136" }, { "name": "FEDORA-2010-19147", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1676", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://blog.torproject.org/blog/tor-02128-released-security-patches", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-02128-released-security-patches" }, { "name": "42667", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42667" }, { "name": "http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches", "refsource": "CONFIRM", "url": "http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches" }, { "name": "1024910", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1024910" }, { "name": "https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog", "refsource": "CONFIRM", "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog" }, { "name": "ADV-2011-0114", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0114" }, { "name": "[or-announce] 20101220 Tor 0.2.1.28 is released (security patches)", "refsource": "MLIST", "url": "http://archives.seul.org/or/announce/Dec-2010/msg00000.html" }, { "name": "ADV-2010-3290", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3290" }, { "name": "GLSA-201101-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201101-02.xml" }, { "name": "45500", "refsource": "BID", "url": "http://www.securityfocus.com/bid/45500" }, { "name": "42916", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42916" }, { "name": "42783", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42783" }, { "name": "42536", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42536" }, { "name": "FEDORA-2010-19159", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html" }, { "name": "DSA-2136", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-2136" }, { "name": "FEDORA-2010-19147", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1676", "datePublished": "2010-12-22T00:00:00", "dateReserved": "2010-04-30T00:00:00", "dateUpdated": "2024-08-07T01:35:53.702Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2007-07-30 21:17
Modified
2025-04-09 00:30
Severity ?
Summary
Buffer overflow in Tor before 0.1.2.15, when using BSD natd support, allows remote attackers to cause a denial of service via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Jul-2007/msg00000.html | Patch | |
cve@mitre.org | http://osvdb.org/46968 | ||
cve@mitre.org | http://secunia.com/advisories/26140 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/25035 | Patch | |
cve@mitre.org | http://www.vupen.com/english/advisories/2007/2634 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jul-2007/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/46968 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26140 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/25035 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/2634 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.14 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Tor before 0.1.2.15, when using BSD natd support, allows remote attackers to cause a denial of service via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en Tor anterior a 0.1.2.15, cuando est\u00e1 siendo utilizado son soporte BSD natd, permite a atacantes remotos provocar denegaci\u00f3n de servicio a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2007-4096", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-30T21:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/46968" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26140" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25035" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/46968" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2634" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html | ||
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html | ||
secalert@redhat.com | http://openwall.com/lists/oss-security/2012/08/21/6 | ||
secalert@redhat.com | http://security.gentoo.org/glsa/glsa-201301-03.xml | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=849949 | ||
secalert@redhat.com | https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c | ||
secalert@redhat.com | https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html | ||
secalert@redhat.com | https://trac.torproject.org/projects/tor/ticket/6480 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2012/08/21/6 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201301-03.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=849949 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://trac.torproject.org/projects/tor/ticket/6480 | Patch |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "D87D8965-CE3A-457E-AD9D-C8EE68F538A4", "versionEndIncluding": "0.2.2.37", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in dns.c in Tor before 0.2.2.38 might allow remote attackers to cause a denial of service (daemon crash) via vectors related to failed DNS requests." }, { "lang": "es", "value": "Vulnerabilidad de liberaci\u00f3n despu\u00e9s de uso en dns.c en Tor anterior a 0.2.2.38 podr\u00eda permitir a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de vectores relacionados con solicitudes fallidas de DNS." } ], "id": "CVE-2012-3517", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:44.043", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849949" }, { "source": "secalert@redhat.com", "url": "https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c" }, { "source": "secalert@redhat.com", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://trac.torproject.org/projects/tor/ticket/6480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-September/088006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=849949" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gitweb.torproject.org/tor.git/commit/62637fa22405278758febb1743da9af562524d4c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://trac.torproject.org/projects/tor/ticket/6480" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-07 00:05
Modified
2025-04-03 01:03
Severity ?
Summary
Tor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote attackers to be preferred over nodes that are identified as more trustworthy "entry guard" (is_guard) systems by directory authorities.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
cve@mitre.org | http://tor.eff.org/cvs/tor/ChangeLog | ||
cve@mitre.org | http://www.osvdb.org/25879 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tor.eff.org/cvs/tor/ChangeLog | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/25879 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor client before 0.1.1.20 prefers entry points based on is_fast or is_stable flags, which could allow remote attackers to be preferred over nodes that are identified as more trustworthy \"entry guard\" (is_guard) systems by directory authorities." }, { "lang": "es", "value": "El Cliente Tor, anterior a 0.1.1.20, prefiere puntos de entrada basados en las banderas is_fast o is_stable, que permitir\u00eda a atacantes remotos ser preferidos sobre los nodos que est\u00e1n identificados como sistemas m\u00e1s confiables \"entry guard\" (is_guard) por las autoridades de directorio." } ], "id": "CVE-2006-3417", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25879" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-07 00:05
Modified
2025-04-03 01:03
Severity ?
Summary
TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
cve@mitre.org | http://tor.eff.org/cvs/tor/ChangeLog | ||
cve@mitre.org | http://www.osvdb.org/25876 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tor.eff.org/cvs/tor/ChangeLog | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/25876 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "TLS handshakes in Tor before 0.1.1.20 generate public-private keys based on TLS context rather than the connection, which makes it easier for remote attackers to conduct brute force attacks on the encryption keys." }, { "lang": "es", "value": "Presentaciones (handshake) TLS en Tor anteriores a 0.1.1.20 generan claves p\u00fablicas-privadas basadas m\u00e1s en el contexto TLS que en la conexi\u00f3n, lo que facilita a los atacantes remotos realizar ataques de fuerza bruta contra las llaves cifradas." } ], "id": "CVE-2006-3411", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25876" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-01-25 19:30
Modified
2025-04-11 00:51
Severity ?
Summary
Tor 0.2.2.x before 0.2.2.7-alpha, when functioning as a directory mirror, does not prevent logging of the client IP address upon detection of erroneous client behavior, which might make it easier for local users to discover the identities of clients in opportunistic circumstances by reading log files.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor 0.2.2.x before 0.2.2.7-alpha, when functioning as a directory mirror, does not prevent logging of the client IP address upon detection of erroneous client behavior, which might make it easier for local users to discover the identities of clients in opportunistic circumstances by reading log files." }, { "lang": "es", "value": "Tor v0.2.2.x anterior a v0.2.2.7-alpha, cuando est\u00e1 funcionando como espejo de directorio, no previene el acceso a la direcci\u00f3n IP cliente al detectar un comportamiento err\u00f3neo del cliente, lo que podr\u00eda facilitar a usuarios locales descubrir las identidades de los clientes en circunstancias favorables, leyendo sus ficheros de registro." } ], "id": "CVE-2010-0384", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-01-25T19:30:01.667", "references": [ { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-01-25 19:30
Modified
2025-04-11 00:51
Severity ?
Summary
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Jan-2010/msg00000.html | ||
cve@mitre.org | http://archives.seul.org/or/talk/Jan-2010/msg00161.html | ||
cve@mitre.org | http://archives.seul.org/or/talk/Jan-2010/msg00162.html | ||
cve@mitre.org | http://archives.seul.org/or/talk/Jan-2010/msg00165.html | ||
cve@mitre.org | http://osvdb.org/61977 | ||
cve@mitre.org | http://secunia.com/advisories/38198 | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/37901 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jan-2010/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/talk/Jan-2010/msg00161.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/talk/Jan-2010/msg00162.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/talk/Jan-2010/msg00165.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/61977 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38198 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/37901 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10_alpha | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, uses deprecated identity keys for certain directory authorities, which makes it easier for man-in-the-middle attackers to compromise the anonymity of traffic sources and destinations." }, { "lang": "es", "value": "Tor anteriores a v0.2.1.22, y v0.2.2.x anteriores a v0.2.2.7-alpha, utiliza claves de identidad obsoleto para determinadas autoridades de directorio , lo que facilita ataques \"man-in-the-middle\" para comprometer el anonimato de las fuentes y de los destinos del tr\u00e1fico." } ], "id": "CVE-2010-0383", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-01-25T19:30:01.637", "references": [ { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00161.html" }, { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" }, { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00165.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/61977" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38198" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/37901" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00161.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00165.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/61977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/37901" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-07 00:05
Modified
2025-04-03 01:03
Severity ?
Summary
Tor before 0.1.1.20 does not validate that a server descriptor's fingerprint line matches its identity key, which allows remote attackers to spoof the fingerprint line, which might be trusted by users or other applications.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
cve@mitre.org | http://tor.eff.org/cvs/tor/ChangeLog | ||
cve@mitre.org | http://www.osvdb.org/25881 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tor.eff.org/cvs/tor/ChangeLog | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/25881 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 does not validate that a server descriptor\u0027s fingerprint line matches its identity key, which allows remote attackers to spoof the fingerprint line, which might be trusted by users or other applications." }, { "lang": "es", "value": "" } ], "id": "CVE-2006-3418", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25881" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25881" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-08-07 10:17
Modified
2025-04-09 00:30
Severity ?
Summary
Tor before 0.1.2.16, when ControlPort is enabled, does not properly restrict commands to localhost port 9051, which allows remote attackers to modify the torrc configuration file, compromise anonymity, and have other unspecified impact via HTTP POST data containing commands without valid authentication, as demonstrated by an HTML form (1) hosted on a web site or (2) injected by a Tor exit node.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Aug-2007/msg00000.html | ||
cve@mitre.org | http://archives.seul.org/or/announce/Sep-2007/msg00000.html | ||
cve@mitre.org | http://osvdb.org/36271 | ||
cve@mitre.org | http://secunia.com/advisories/26301 | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/25188 | ||
cve@mitre.org | http://www.securitytracker.com/id?1018510 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/2768 | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/35784 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/36407 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Aug-2007/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Sep-2007/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/36271 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26301 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/25188 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1018510 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/2768 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/35784 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/36407 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "67A44A79-CE5A-44D7-A6E6-4E7A3AA1DA2C", "versionEndIncluding": "0.1.2.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.16, when ControlPort is enabled, does not properly restrict commands to localhost port 9051, which allows remote attackers to modify the torrc configuration file, compromise anonymity, and have other unspecified impact via HTTP POST data containing commands without valid authentication, as demonstrated by an HTML form (1) hosted on a web site or (2) injected by a Tor exit node." }, { "lang": "es", "value": "Tor versiones anteriores a 0.1.2.16, cuando ControlPort est\u00e1 habilitado, no restringe apropiadamente los comandos al puerto localhost 9051, lo que permite a atacantes remotos modificar el archivo de configuraci\u00f3n de torrc, comprometer el anonimato y presentar otro impacto no especificado por medio de datos POST HTTP que contienen comandos sin autenticaci\u00f3n v\u00e1lida, como es demostrado por un formulario HTML (1) alojado en un sitio web o (2) inyectado por un nodo de salida Tor." } ], "id": "CVE-2007-4174", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-08-07T10:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/announce/Aug-2007/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/announce/Sep-2007/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/36271" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26301" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/25188" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018510" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/2768" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35784" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/announce/Aug-2007/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/announce/Sep-2007/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36271" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/26301" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/25188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018510" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/2768" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/35784" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36407" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-01-19 12:00
Modified
2025-04-11 00:51
Severity ?
Summary
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://archives.seul.org/or/announce/Jan-2011/msg00000.html | Patch | |
secalert@redhat.com | http://blog.torproject.org/blog/tor-02129-released-security-patches | Patch | |
secalert@redhat.com | http://secunia.com/advisories/42905 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/42907 | Vendor Advisory | |
secalert@redhat.com | http://www.debian.org/security/2011/dsa-2148 | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2011/01/18/7 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/45832 | ||
secalert@redhat.com | http://www.securitytracker.com/id?1024980 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0131 | Vendor Advisory | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0132 | Vendor Advisory | |
secalert@redhat.com | https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | Patch | |
secalert@redhat.com | https://trac.torproject.org/projects/tor/ticket/2324 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jan-2011/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://blog.torproject.org/blog/tor-02129-released-security-patches | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42905 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42907 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2148 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2011/01/18/7 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/45832 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024980 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0131 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0132 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://trac.torproject.org/projects/tor/ticket/2324 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBA88C1D-CC02-4808-B981-DCD64917CD41", "versionEndIncluding": "0.2.1.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor." }, { "lang": "es", "value": "Tor antes de v0.2.1.29 y v0.2.2.x antes de v0.2.2.21-alfa no comprueba correctamente el nivel de compresi\u00f3n de datos de zlib, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de un factor de compresi\u00f3n de gran tama\u00f1o." } ], "id": "CVE-2011-0015", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-19T12:00:06.623", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42905" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42907" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2148" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2011/01/18/7" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/45832" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1024980" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "secalert@redhat.com", "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42907" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2011/01/18/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024980" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://trac.torproject.org/projects/tor/ticket/2324" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-07 00:05
Modified
2025-04-03 01:03
Severity ?
Summary
Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/20277 | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200606-04.xml | Patch, Vendor Advisory | |
cve@mitre.org | http://tor.eff.org/cvs/tor/ChangeLog | ||
cve@mitre.org | http://www.securityfocus.com/bid/19795 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/26793 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20277 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200606-04.xml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://tor.eff.org/cvs/tor/ChangeLog | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/19795 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/26793 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 allows remote attackers to spoof log entries or possibly execute shell code via strings with non-printable characters." }, { "lang": "es", "value": "Tor versiones anteriores a la 0.1.1.20 permite a atacantes remotos falsificar entradas de log o posiblemente ejecutar c\u00f3digo por consola a trav\u00e9s de cadenas de caracteres no imprimibles." } ], "id": "CVE-2006-3407", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20277" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19795" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26793" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-14 17:55
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in the policy_summarize function in or/policies.c in Tor before 0.2.1.30 allows remote attackers to cause a denial of service (directory authority crash) via a crafted policy that triggers creation of a long port list.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061258.html | ||
secalert@redhat.com | http://secunia.com/advisories/43548 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/44862 | Vendor Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/46618 | ||
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=705192 | Patch | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=705194 | ||
secalert@redhat.com | https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e | Patch | |
secalert@redhat.com | https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061258.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43548 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44862 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/46618 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=705192 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=705194 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html | Patch |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10_alpha | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.1.1.27 | |
tor | tor | 0.2.1.1.28 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.1.28 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "7983C11D-5B1E-46FA-9ABF-ABAE995B11BE", "versionEndIncluding": "0.2.1.29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the policy_summarize function in or/policies.c in Tor before 0.2.1.30 allows remote attackers to cause a denial of service (directory authority crash) via a crafted policy that triggers creation of a long port list." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en la funci\u00f3n policy_summarize en or/policies.c en Tor antes de v0.2.1.30 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de la autoridad de directorio) a trav\u00e9s de una pol\u00edtica manipulada que provoca la creaci\u00f3n de una lista de puertos largos." } ], "id": "CVE-2011-1924", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-14T17:55:05.313", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061258.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43548" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44862" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/46618" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705192" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705194" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061258.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43548" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/44862" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/46618" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=705194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/commit/43414eb98821d3b5c6c65181d7545ce938f82c8e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://lists.torproject.org/pipermail/tor-announce/2011-February/000000.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-30 21:17
Modified
2025-04-09 00:30
Severity ?
Summary
Tor before 0.1.2.15 can select a guard node beyond the first listed never-before-connected-to guard node, which allows remote attackers with control of certain guard nodes to obtain sensitive information and possibly leverage further attacks.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Jul-2007/msg00000.html | Patch | |
cve@mitre.org | http://osvdb.org/46971 | ||
cve@mitre.org | http://secunia.com/advisories/26140 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/25035 | Patch | |
cve@mitre.org | http://www.vupen.com/english/advisories/2007/2634 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jul-2007/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/46971 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26140 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/25035 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/2634 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.14 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.15 can select a guard node beyond the first listed never-before-connected-to guard node, which allows remote attackers with control of certain guard nodes to obtain sensitive information and possibly leverage further attacks." }, { "lang": "es", "value": "Tor anterior a 0.1.2.15 podr\u00eda seleccionar un nodo guard\u00eda m\u00e1s all\u00e1 del nodo protector\r\nnunca-antes-conectar-a, el cual podr\u00eda permitir a atacantes remotos con control sobre ciertos nodos guarda obtener informaci\u00f3n sensible y posiblemente llevar a cabo ataques adicionales." } ], "id": "CVE-2007-4099", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-30T21:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/46971" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26140" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25035" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/46971" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2634" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-12-31 05:00
Modified
2025-04-09 00:30
Severity ?
Summary
Tor allows remote attackers to discover the IP address of a hidden service by accessing this service at a high rate, thereby changing the server's CPU temperature and consequently changing the pattern of time values visible through (1) ICMP timestamps, (2) TCP sequence numbers, and (3) TCP timestamps, a different vulnerability than CVE-2006-0414. NOTE: it could be argued that this is a laws-of-physics vulnerability that is a fundamental design limitation of certain hardware implementations, so perhaps this issue should not be included in CVE.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html | ||
cve@mitre.org | http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf | Exploit | |
cve@mitre.org | http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/ |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor allows remote attackers to discover the IP address of a hidden service by accessing this service at a high rate, thereby changing the server\u0027s CPU temperature and consequently changing the pattern of time values visible through (1) ICMP timestamps, (2) TCP sequence numbers, and (3) TCP timestamps, a different vulnerability than CVE-2006-0414. NOTE: it could be argued that this is a laws-of-physics vulnerability that is a fundamental design limitation of certain hardware implementations, so perhaps this issue should not be included in CVE." }, { "lang": "es", "value": "Tor permite a atacantes remotos descubrir la direcci\u00f3n IP de un servicio oculto accediendo a este servicio a un alto ritmo de repetici\u00f3n, y por tanto cambiando la temperatura de la CPU y consecuentemente cambiando el patr\u00f3n de valores de tiempo visibles a trav\u00e9s de (1) marcas de tiempo ICMP, (2) n\u00fameros de secuencia TCP, y (3) marcas de tiempo TCP, una vulnerabilidad distinta de CVE-2006-0414. NOTA: podr\u00eda argumentarse que esto es una vulnerabilidad de las leyes de la f\u00edsica que es una limitaci\u00f3n fundamental de dise\u00f1o de determinadas implementaciones de hardware, por tanto quiz\u00e1s este problema no deber\u00eda ser incluido en CVE." } ], "id": "CVE-2006-6893", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf" }, { "source": "cve@mitre.org", "url": "http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://events.ccc.de/congress/2006/Fahrplan/events/1513.en.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.lightbluetouchpaper.org/2006/09/04/hot-or-not-revealing-hidden-services-by-their-clock-skew/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-01-19 12:00
Modified
2025-04-11 00:51
Severity ?
Summary
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Jan-2011/msg00000.html | ||
cve@mitre.org | http://blog.torproject.org/blog/tor-02129-released-security-patches | Patch | |
cve@mitre.org | http://www.securityfocus.com/bid/45953 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/64867 | ||
cve@mitre.org | https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | Patch | |
cve@mitre.org | https://trac.torproject.org/projects/tor/ticket/2326 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jan-2011/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://blog.torproject.org/blog/tor-02129-released-security-patches | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/45953 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/64867 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://trac.torproject.org/projects/tor/ticket/2326 | Patch |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBA88C1D-CC02-4808-B981-DCD64917CD41", "versionEndIncluding": "0.2.1.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file." }, { "lang": "es", "value": "Tor anterior a v0.2.1.29 y v0.2.2x anterior a 0.2.2.21-alpha permite a atacantes remotos provocar una denegaci\u00f3n de servicio (error de aserci\u00f3n y salida demonio) a trav\u00e9s de gotas que disparan un tama\u00f1o de archivo determinado, como lo demuestra con cached-descriptors.new file." } ], "id": "CVE-2011-0492", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-19T12:00:20.657", "references": [ { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/45953" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64867" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://trac.torproject.org/projects/tor/ticket/2326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64867" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://trac.torproject.org/projects/tor/ticket/2326" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-07-10 17:30
Modified
2025-04-09 00:30
Severity ?
Summary
Tor before 0.2.0.35 allows remote attackers to cause a denial of service (application crash) via a malformed router descriptor.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Jun-2009/msg00000.html | Patch | |
cve@mitre.org | http://secunia.com/advisories/35546 | Vendor Advisory | |
cve@mitre.org | http://www.osvdb.org/55340 | Patch | |
cve@mitre.org | http://www.securityfocus.com/bid/35505 | Patch | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/1716 | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/51376 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jun-2009/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35546 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/55340 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/35505 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1716 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/51376 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.0.35 allows remote attackers to cause a denial of service (application crash) via a malformed router descriptor." }, { "lang": "es", "value": "Tor anterior a v0.2.0.35 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (cuelgue de aplicaci\u00f3n) a trav\u00e9s de un descriptor de enrutador (router) malformado." } ], "id": "CVE-2009-2425", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-07-10T17:30:00.343", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35546" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.osvdb.org/55340" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/35505" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51376" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.osvdb.org/55340" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/35505" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51376" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html | ||
secalert@redhat.com | http://openwall.com/lists/oss-security/2012/08/21/6 | ||
secalert@redhat.com | http://secunia.com/advisories/50583 | ||
secalert@redhat.com | http://security.gentoo.org/glsa/glsa-201301-03.xml | ||
secalert@redhat.com | https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a | ||
secalert@redhat.com | https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b | ||
secalert@redhat.com | https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html | ||
secalert@redhat.com | https://trac.torproject.org/projects/tor/ticket/6537 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2012/08/21/6 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/50583 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201301-03.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a | ||
af854a3a-2127-422b-91ae-364da2661108 | https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://trac.torproject.org/projects/tor/ticket/6537 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "D87D8965-CE3A-457E-AD9D-C8EE68F538A4", "versionEndIncluding": "0.2.2.37", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "routerlist.c in Tor before 0.2.2.38 uses a different amount of time for relay-list iteration depending on which relay is chosen, which might allow remote attackers to obtain sensitive information about relay selection via a timing side-channel attack." }, { "lang": "es", "value": "routerlist.c en Tor anterior a v0.2.2.38 utiliza una cantidad diferente de tiempo para la iteraci\u00f3n relay-list dependiendo de que (relay) sea elegido, lo cual podr\u00eda permitir a atacantes remotos obtener informaci\u00f3n sensible sobre la selecci\u00f3n del (relay) a trav\u00e9s de un ataque de tiempo al canal lateral (timing side-channel attack)." } ], "id": "CVE-2012-3519", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:44.153", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/50583" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "source": "secalert@redhat.com", "url": "https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a" }, { "source": "secalert@redhat.com", "url": "https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b" }, { "source": "secalert@redhat.com", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "source": "secalert@redhat.com", "url": "https://trac.torproject.org/projects/tor/ticket/6537" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gitweb.torproject.org/tor.git/commit/308f6dad20675c42b29862f4269ad1fbfb00dc9a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gitweb.torproject.org/tor.git/commit/d48cebc5e498b0ae673635f40fc57cdddab45d5b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://trac.torproject.org/projects/tor/ticket/6537" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-12-09 00:30
Modified
2025-04-09 00:30
Severity ?
Summary
Tor before 0.2.0.32 does not properly process the (1) User and (2) Group configuration options, which might allow local users to gain privileges by leveraging unintended supplementary group memberships of the Tor process.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://blog.torproject.org/blog/tor-0.2.0.32-released | ||
cve@mitre.org | http://secunia.com/advisories/33025 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/34583 | ||
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200904-11.xml | ||
cve@mitre.org | http://www.securityfocus.com/bid/32648 | Patch | |
cve@mitre.org | http://www.vupen.com/english/advisories/2008/3366 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/47101 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://blog.torproject.org/blog/tor-0.2.0.32-released | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33025 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34583 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200904-11.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/32648 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/3366 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/47101 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10_alpha | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB84ADB5-01EA-4ECF-B36E-9CE54E8309C0", "versionEndIncluding": "0.1.2.31", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.0.32 does not properly process the (1) User and (2) Group configuration options, which might allow local users to gain privileges by leveraging unintended supplementary group memberships of the Tor process." }, { "lang": "es", "value": "Tor anterior a v0.2.32 no procesa adecuadamente la configuraci\u00f3n de las opciones de (1)usuario (User) y (2) Grupo (group), lo que permitir\u00eda a usuarios locales obtener privilegios aprovechando la pertenencia a grupos creados por defecto en los procesos de Tor." } ], "id": "CVE-2008-5397", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-12-09T00:30:00.567", "references": [ { "source": "cve@mitre.org", "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33025" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34583" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/32648" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/32648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47101" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-08-23 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Aug-2005/msg00002.html | Vendor Advisory | |
cve@mitre.org | http://marc.info/?l=bugtraq&m=112448002732443&w=2 | ||
cve@mitre.org | http://secunia.com/advisories/16424 | Patch, Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1014739 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Aug-2005/msg00002.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=112448002732443&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/16424 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1014739 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor 0.1.0.13 and earlier, and experimental versions 0.1.1.4-alpha and earlier, does not reject certain weak keys when using ephemeral Diffie-Hellman (DH) handshakes, which allows malicious Tor servers to obtain the keys that a client uses for other systems in the circuit." } ], "id": "CVE-2005-2643", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-23T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://archives.seul.org/or/announce/Aug-2005/msg00002.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=112448002732443\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16424" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1014739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://archives.seul.org/or/announce/Aug-2005/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=112448002732443\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16424" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1014739" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-12-23 03:59
Modified
2025-04-11 00:51
Severity ?
Summary
Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blog.torproject.org/blog/tor-02225-alpha-out | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.torproject.org/blog/tor-02225-alpha-out | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.1.1.27 | |
tor | tor | 0.2.1.1.28 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.1.28 | |
tor | tor | 0.2.1.29 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 | |
tor | tor | 0.2.2.23 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC9EE1A-FAD7-40FB-A4E7-9916432977F3", "versionEndIncluding": "0.2.2.24", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "281100EE-90F3-4814-B5E7-F625A84293FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "012F5070-0619-4F0D-A446-E59B9B7703CC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.25-alpha, when configured as a relay without the Nickname configuration option, uses the local hostname as the Nickname value, which allows remote attackers to obtain potentially sensitive information by reading this value." }, { "lang": "es", "value": "Las versiones de Tor anteriores a v0.2.2.25-alpha, cuando son configuradas en modo reenvio (relay) sin la opci\u00f3n de configuraci\u00f3n de Nickname (apodo), utilizan el nombre del equipo local como Nickname (apodo), lo cual permite a atacantes remotos potenciales obtener informaci\u00f3n sensible a trav\u00e9s de la lectura de este valor." } ], "id": "CVE-2011-4897", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-23T03:59:22.177", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02225-alpha-out" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02225-alpha-out" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-07-10 17:30
Modified
2025-04-09 00:30
Severity ?
Summary
The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0.35 and 0.1.x before 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an internal IP address via unknown vectors. NOTE: some of these details are obtained from third party information.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Jun-2009/msg00000.html | Patch | |
cve@mitre.org | http://secunia.com/advisories/35546 | Vendor Advisory | |
cve@mitre.org | http://www.osvdb.org/55341 | Patch | |
cve@mitre.org | http://www.securityfocus.com/bid/35505 | Patch | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/1716 | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/51377 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jun-2009/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35546 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/55341 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/35505 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1716 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/51377 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10_alpha | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The connection_edge_process_relay_cell_not_open function in src/or/relay.c in Tor 0.2.x before 0.2.0.35 and 0.1.x before 0.1.2.8-beta allows exit relays to have an unspecified impact by causing controllers to accept DNS responses that redirect to an internal IP address via unknown vectors. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "La funci\u00f3n connection_edge_process_relay_cell_not_open en src/or/relay.c en Tor v0.2.x anterior a v0.2.0.35 y v0.1.x anterior a v0.1.2.8-beta\r\npermite a los retransmisores (relays) de salida tener un impacto no especificado al provocar que los controladores acepten respuestas DNS que redirigen a direcciones IP internas a traves de vectores desconocidos. NOTA: algunos de estos detalles se obtienen a partir de informaci\u00f3n de terceros." } ], "id": "CVE-2009-2426", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-07-10T17:30:00.360", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35546" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.osvdb.org/55341" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/35505" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jun-2009/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.osvdb.org/55341" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/35505" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1716" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51377" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-07 00:05
Modified
2025-04-03 01:03
Severity ?
Summary
Tor before 0.1.1.20 uses improper logic to validate the "OR" destination, which allows remote attackers to perform a man-in-the-middle (MITM) attack via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
cve@mitre.org | http://tor.eff.org/cvs/tor/ChangeLog | ||
cve@mitre.org | http://www.osvdb.org/25878 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tor.eff.org/cvs/tor/ChangeLog | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/25878 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 uses improper logic to validate the \"OR\" destination, which allows remote attackers to perform a man-in-the-middle (MITM) attack via unspecified vectors." }, { "lang": "es", "value": "Tor versiones anteriores a 0.1.1.20 utiliza una l\u00f3gica inapropiada para validar el destino \"OR\", lo cual permite a atacantes remotos llevar a cabo un ataque man-in-the-middle (MITM) a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2006-3415", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25878" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25878" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-01-19 12:00
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Jan-2011/msg00000.html | Patch | |
cve@mitre.org | http://blog.torproject.org/blog/tor-02129-released-security-patches | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/42905 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/42907 | Vendor Advisory | |
cve@mitre.org | http://www.debian.org/security/2011/dsa-2148 | ||
cve@mitre.org | http://www.securityfocus.com/bid/45832 | ||
cve@mitre.org | http://www.securitytracker.com/id?1024980 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2011/0131 | Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2011/0132 | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/64748 | ||
cve@mitre.org | https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jan-2011/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://blog.torproject.org/blog/tor-02129-released-security-patches | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42905 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42907 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2148 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/45832 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024980 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0131 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0132 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/64748 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | Patch |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBA88C1D-CC02-4808-B981-DCD64917CD41", "versionEndIncluding": "0.2.1.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en memoria din\u00e1mica en Tor anterior a v0.2.1.29 y v0.2.2.x anterior a v0.2.2.21-alpha permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y bloqueo de la aplicaci\u00f3n) o posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-0427", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-19T12:00:19.750", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42905" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42907" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2148" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/45832" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1024980" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64748" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42907" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024980" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-08-31 23:04
Modified
2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service (flood) via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Aug-2006/msg00001.html | Patch | |
cve@mitre.org | http://secunia.com/advisories/21708 | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/21725 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.scatterchat.com/advisories/2006-02_tech.html | Patch, Vendor Advisory, URL Repurposed | |
cve@mitre.org | http://www.securityfocus.com/bid/19785 | Patch | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/28686 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Aug-2006/msg00001.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21708 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/21725 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.scatterchat.com/advisories/2006-02_tech.html | Patch, Vendor Advisory, URL Repurposed | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/19785 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/28686 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
scatterchat | scatterchat | * | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:scatterchat:scatterchat:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A31047A-47A2-4D8D-B5C3-ABBB213FB0EE", "versionEndIncluding": "1.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in (1) Tor 0.1.0.x before 0.1.0.18 and 0.1.1.x before 0.1.1.23, and (2) ScatterChat before 1.0.2, allows remote attackers operating a Tor entry node to route arbitrary Tor traffic through clients or cause a denial of service (flood) via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en (1) Tor 0.1.0.x anteriores a 0.1.0.18 y 0.1.1.x anteriores a 0.1.1.23, y (2) ScatterChat anterior a 1.0.2, permite a atacantes remotos operando un \"nodo de entrada\" en la red Tor encaminar tr\u00e1fico Tor de su elecci\u00f3n a trav\u00e9s de clientes o causar una denegaci\u00f3n de acceso (inundaci\u00f3n) mediante vectores no especificados.\r\n\r\n" } ], "evaluatorSolution": "This vulenrability is addressed in the following product release:\r\nTor, Tor, 0.1.1.23, and later\r\nScatterchat, Scatterchat, 1.0.2", "id": "CVE-2006-4508", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-08-31T23:04:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Aug-2006/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21708" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21725" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory", "URL Repurposed" ], "url": "http://www.scatterchat.com/advisories/2006-02_tech.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19785" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28686" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Aug-2006/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21725" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory", "URL Repurposed" ], "url": "http://www.scatterchat.com/advisories/2006-02_tech.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19785" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28686" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-03-18 02:00
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Tor before 0.2.0.34 allows attackers to cause a denial of service (infinite loop) via "corrupt votes."
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Feb-2009/msg00000.html | Patch | |
cve@mitre.org | http://secunia.com/advisories/33880 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/34583 | ||
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200904-11.xml | ||
cve@mitre.org | http://www.securityfocus.com/bid/33713 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Feb-2009/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33880 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34583 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200904-11.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/33713 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C390EF7-1A08-4BAD-8DA5-8402AA2AB7AE", "versionEndIncluding": "0.2.0.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows attackers to cause a denial of service (infinite loop) via \"corrupt votes.\"" }, { "lang": "es", "value": "Vulnerabilidad no especificada en Tor anterior a v0.2.0.34 permite a atacantes provocar una denegaci\u00f3n de servicio (bucle infinito) a trav\u00e9s de \"votos corruptos\"." } ], "id": "CVE-2009-0936", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-18T02:00:08.170", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33880" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34583" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/33713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/33713" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-01-19 12:00
Modified
2025-04-11 00:51
Severity ?
Summary
The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to "underflow errors."
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Jan-2011/msg00000.html | Patch | |
cve@mitre.org | http://blog.torproject.org/blog/tor-02129-released-security-patches | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/45953 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/64888 | ||
cve@mitre.org | https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | Patch | |
cve@mitre.org | https://trac.torproject.org/projects/tor/ticket/2324 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jan-2011/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://blog.torproject.org/blog/tor-02129-released-security-patches | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/45953 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/64888 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://trac.torproject.org/projects/tor/ticket/2324 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBA88C1D-CC02-4808-B981-DCD64917CD41", "versionEndIncluding": "0.2.1.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors, related to \"underflow errors.\"" }, { "lang": "es", "value": "La funci\u00f3n tor_realloc de Tor en versiones anteriores a la 0.2.1.29 y 0.2.2.x anteriores a la 0.2.2.21-alpha no valida el tama\u00f1o de determinado valor durante la reserva de memoria, lo que puede permitir a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de vectores sin especificar. Relacioando con errores de \"underflow\"." } ], "id": "CVE-2011-0491", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-19T12:00:20.047", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/45953" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64888" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "cve@mitre.org", "url": "https://trac.torproject.org/projects/tor/ticket/2324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://trac.torproject.org/projects/tor/ticket/2324" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-12-23 03:59
Modified
2025-04-11 00:51
Severity ?
Summary
Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.1.1.27 | |
tor | tor | 0.2.1.1.28 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.1.28 | |
tor | tor | 0.2.1.29 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:alpha:*:*:*:*:*:*", "matchCriteriaId": "01CF8C55-D712-4EB3-ABCD-A79161F0FD86", "versionEndIncluding": "0.2.2.23", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "281100EE-90F3-4814-B5E7-F625A84293FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.24-alpha continues to use a reachable bridge that was previously configured but is not currently configured, which might allow remote attackers to obtain sensitive information about clients in opportunistic circumstances by monitoring network traffic to the bridge port." }, { "lang": "es", "value": "Las versiones de Tor anteriores a v0.2.2.24-alpha continua utilizando un puerto en modo bridge que ya sido configurado previamente, pero que no ha sido configurado en el momento actual, lo cual podr\u00eda permitir a atacantes remotos obtener informaci\u00f3n sensible sobre clientes en determinadas circusntancias por medio de la monitorizaci\u00f3n del tr\u00e1fico de red que llega al puerto configurado en modo bridge." } ], "id": "CVE-2011-4896", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-23T03:59:22.130", "references": [ { "source": "cve@mitre.org", "url": "https://blog.torproject.org/blog/tor-02224-alpha-out" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://blog.torproject.org/blog/tor-02224-alpha-out" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-01-25 11:03
Modified
2025-04-03 01:03
Severity ?
Summary
Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Jan-2006/msg00001.html | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/18576 | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/20514 | ||
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
cve@mitre.org | http://tor.eff.org/cvs/tor/ChangeLog | ||
cve@mitre.org | http://www.osvdb.org/22689 | ||
cve@mitre.org | http://www.securityfocus.com/bid/18323 | ||
cve@mitre.org | http://www.securityfocus.com/bid/19795 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/24285 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jan-2006/msg00001.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/18576 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20514 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tor.eff.org/cvs/tor/ChangeLog | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/22689 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/18323 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/19795 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/24285 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server." }, { "lang": "es", "value": "Tor anterior a 0.1.1.10 permite a atacantes remotos identificar servicios ocultos mediante un servidor Tor malicioso que intenta un gran n\u00famero de accesos al servicio oculto, lo que acaba causando que un circuito sea construido a trav\u00e9s del servidor malicioso." } ], "id": "CVE-2006-0414", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-01-25T11:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.seul.org/or/announce/Jan-2006/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18576" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/22689" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/18323" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19795" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.seul.org/or/announce/Jan-2006/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/18576" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/22689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/18323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24285" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-12-09 00:30
Modified
2025-04-09 00:30
Severity ?
Summary
Tor before 0.2.0.32 does not properly process the ClientDNSRejectInternalAddresses configuration option in situations where an exit relay issues a policy-based refusal of a stream, which allows remote exit relays to have an unknown impact by mapping an internal IP address to the destination hostname of a refused stream.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://blog.torproject.org/blog/tor-0.2.0.32-released | Patch | |
cve@mitre.org | http://secunia.com/advisories/33025 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/34583 | ||
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200904-11.xml | ||
cve@mitre.org | http://www.securityfocus.com/bid/32648 | Patch | |
cve@mitre.org | http://www.vupen.com/english/advisories/2008/3366 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/47102 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://blog.torproject.org/blog/tor-0.2.0.32-released | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33025 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34583 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200904-11.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/32648 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2008/3366 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/47102 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10_alpha | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB84ADB5-01EA-4ECF-B36E-9CE54E8309C0", "versionEndIncluding": "0.1.2.31", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.0.32 does not properly process the ClientDNSRejectInternalAddresses configuration option in situations where an exit relay issues a policy-based refusal of a stream, which allows remote exit relays to have an unknown impact by mapping an internal IP address to the destination hostname of a refused stream." }, { "lang": "es", "value": "Tor anterior a v0.2.0.32 no procesa adecuadamente la opci\u00f3n de configuraci\u00f3n ClientDNSRejectInternalAddresses en situaciones donde una cuesti\u00f3n en la salida de transmisi\u00f3n de una pol\u00edtica que deniega el flujo, puede permitir a flujos de salida remotos tener un impacto desconocido mediante el mapeo de una direcci\u00f3n IP interna hacia el nombre de host destino de una flujo denegado." } ], "id": "CVE-2008-5398", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-12-09T00:30:00.597", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33025" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34583" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/32648" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47102" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.32-released" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/32648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/3366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47102" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-07 00:05
Modified
2025-04-03 01:03
Severity ?
Summary
The privoxy configuration file in Tor before 0.1.1.20, when run on Apple OS X, logs all data via the "logfile", which allows attackers to obtain potentially sensitive information.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
cve@mitre.org | http://tor.eff.org/cvs/tor/ChangeLog | ||
cve@mitre.org | http://www.osvdb.org/25875 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tor.eff.org/cvs/tor/ChangeLog | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/25875 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The privoxy configuration file in Tor before 0.1.1.20, when run on Apple OS X, logs all data via the \"logfile\", which allows attackers to obtain potentially sensitive information." }, { "lang": "es", "value": "El archivo de configuraci\u00f3n en Tor antes de la versi\u00f3n 0.1.1.20, cuando se ejecuta en Apple OS X, almacena todos los archivos de log a trav\u00e9s del \"logfile\", lo que permite a atacantes remotos obtener informaci\u00f3n potencialmente sensible." } ], "id": "CVE-2006-3413", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25875" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-07 00:05
Modified
2025-04-03 01:03
Severity ?
Summary
Tor before 0.1.1.20 kills the circuit when it receives an unrecognized relay command, which causes network circuits to be disbanded. NOTE: while this item is listed under the "Security fixes" section of the developer changelog, the developer clarified on 20060707 that this is only a self-DoS. Therefore this issue should not be included in CVE
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
cve@mitre.org | http://tor.eff.org/cvs/tor/ChangeLog | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tor.eff.org/cvs/tor/ChangeLog |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 kills the circuit when it receives an unrecognized relay command, which causes network circuits to be disbanded. NOTE: while this item is listed under the \"Security fixes\" section of the developer changelog, the developer clarified on 20060707 that this is only a self-DoS. Therefore this issue should not be included in CVE" }, { "lang": "es", "value": "** CUESTIONADA ** Tor anterior a 0.1.1.20 cancela el circuito cuando recibe un comando de transmitir err\u00f3neo, lo que provoca que los circuitos de la red sean desconectados. NOTA: Mientras que este elemento aparece listado bajo la secci\u00f3n \"Soluciones de seguridad\" del Log de cambios del desarrollador, el mismo aclara en 20060707 que esto es solamente un Self-DoS. Por consiguiente este asunto no ser\u00e1 incluido en CVE. \r\n\r\n" } ], "id": "CVE-2006-3416", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-07 00:05
Modified
2025-04-03 01:03
Severity ?
Summary
Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
cve@mitre.org | http://tor.eff.org/cvs/tor/ChangeLog | ||
cve@mitre.org | http://www.osvdb.org/25880 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tor.eff.org/cvs/tor/ChangeLog | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/25880 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 uses OpenSSL pseudo-random bytes (RAND_pseudo_bytes) instead of cryptographically strong RAND_bytes, and seeds the entropy value at start-up with 160-bit chunks without reseeding, which makes it easier for attackers to conduct brute force guessing attacks." }, { "lang": "es", "value": "Tor versiones anteriores a la 0.1.1.20 utiliza bytes pseudo aleatorios OpenSSL (RAND_pseudo_bytes) en vez de RAND_bytes que son criptogr\u00e1ficamente fuertes y genera el valor de entrop\u00eda al arranque con fragmentos de 160 bits sin regeneraci\u00f3n de semillas, lo cual facilita a los atacantes llevar a cabo ataques de adivinaci\u00f3n por fuerza bruta." } ], "id": "CVE-2006-3419", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25880" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-06-11 22:30
Modified
2025-04-09 00:30
Severity ?
Summary
Tor before 0.1.2.14 can construct circuits in which an entry guard is in the same family as the exit node, which might compromise the anonymity of traffic sources and destinations by exposing traffic to inappropriate remote observers.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/May-2007/msg00000.html | ||
cve@mitre.org | http://osvdb.org/35670 | ||
cve@mitre.org | http://secunia.com/advisories/25415 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/24180 | Patch | |
cve@mitre.org | http://www.vupen.com/english/advisories/2007/1964 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/May-2007/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/35670 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/25415 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/24180 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/1964 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.2.1_alpha-cvs |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.14 can construct circuits in which an entry guard is in the same family as the exit node, which might compromise the anonymity of traffic sources and destinations by exposing traffic to inappropriate remote observers." }, { "lang": "es", "value": "Tor anterior a 0.1.2.14 puede construir circuitos en los cuales un protector de entrada est\u00e1 en la misma familia que el nodo de la salida, lo cual puede comprometer el anonimato de las fuentes y de los destinatarios del tr\u00e1fico exponiendo tr\u00e1fico a los observadores remotos inadecuados." } ], "id": "CVE-2007-3165", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-06-11T22:30:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/announce/May-2007/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/35670" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/25415" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/24180" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1964" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/announce/May-2007/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/35670" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/25415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/24180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1964" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-26 03:17
Modified
2025-04-11 00:51
Severity ?
Summary
The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html | ||
secalert@redhat.com | http://openwall.com/lists/oss-security/2012/08/21/6 | ||
secalert@redhat.com | http://secunia.com/advisories/50583 | ||
secalert@redhat.com | http://security.gentoo.org/glsa/glsa-201301-03.xml | ||
secalert@redhat.com | https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546 | ||
secalert@redhat.com | https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f | ||
secalert@redhat.com | https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html | ||
secalert@redhat.com | https://trac.torproject.org/projects/tor/ticket/6530 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2012/08/21/6 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/50583 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201301-03.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://trac.torproject.org/projects/tor/ticket/6530 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "D87D8965-CE3A-457E-AD9D-C8EE68F538A4", "versionEndIncluding": "0.2.2.37", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The networkstatus_parse_vote_from_string function in routerparse.c in Tor before 0.2.2.38 does not properly handle an invalid flavor name, which allows remote attackers to cause a denial of service (out-of-bounds read and daemon crash) via a crafted (1) vote document or (2) consensus document." }, { "lang": "es", "value": "La funci\u00f3n networkstatus_parse_vote_from_string en routerparse.c en Tor anterior a v0.2.2.38 no maneja adecuadamente un (flavor name), lo cual podr\u00eda permitir a atacantes remotos causar una denegaci\u00f3n de servicio (lectura fuera de rango y ca\u00edda del demonio) a trav\u00e9s de (1) un documento de voto o (2) un documento de consenso manipulados." } ], "id": "CVE-2012-3518", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-26T03:17:44.090", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "source": "secalert@redhat.com", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/50583" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "source": "secalert@redhat.com", "url": "https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546" }, { "source": "secalert@redhat.com", "url": "https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f" }, { "source": "secalert@redhat.com", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "source": "secalert@redhat.com", "url": "https://trac.torproject.org/projects/tor/ticket/6530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://openwall.com/lists/oss-security/2012/08/21/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/50583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201301-03.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gitweb.torproject.org/tor.git/commit/55f635745afacefffdaafc72cc176ca7ab817546" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gitweb.torproject.org/tor.git/commit/57e35ad3d91724882c345ac709666a551a977f0f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.torproject.org/pipermail/tor-announce/2012-August/000086.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://trac.torproject.org/projects/tor/ticket/6530" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-12-22 01:00
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Dec-2010/msg00000.html | Patch | |
cve@mitre.org | http://blog.torproject.org/blog/tor-02128-released-security-patches | Patch | |
cve@mitre.org | http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches | Patch | |
cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html | ||
cve@mitre.org | http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html | ||
cve@mitre.org | http://secunia.com/advisories/42536 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/42667 | ||
cve@mitre.org | http://secunia.com/advisories/42783 | ||
cve@mitre.org | http://secunia.com/advisories/42916 | ||
cve@mitre.org | http://security.gentoo.org/glsa/glsa-201101-02.xml | ||
cve@mitre.org | http://securitytracker.com/id?1024910 | ||
cve@mitre.org | http://www.debian.org/security/2010/dsa-2136 | ||
cve@mitre.org | http://www.securityfocus.com/bid/45500 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2010/3290 | Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2011/0114 | ||
cve@mitre.org | https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Dec-2010/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://blog.torproject.org/blog/tor-02128-released-security-patches | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42536 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42667 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42783 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42916 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201101-02.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1024910 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2010/dsa-2136 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/45500 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/3290 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0114 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10_alpha | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "E25EC348-75E2-48FF-9C4A-033250365CE0", "versionEndIncluding": "0.2.1.1.27", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Tor before 0.2.1.28 and 0.2.2.x before 0.2.2.20-alpha allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors." }, { "lang": "es", "value": "Desbordamiento de Desbordamiento de b\u00fafer basado en mont\u00edculo en Tor before v0.2.1.28 y v0.2.2.x anterior v0.2.2.20-alpha permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda de demonio) o probablemente ejecutar c\u00f3digo arbitrario de su elecci\u00f3n a trav\u00e9s de vectores no especificados.\r\n\r\n\r\n" } ], "id": "CVE-2010-1676", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-12-22T01:00:02.687", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Dec-2010/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02128-released-security-patches" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html" }, { "source": "cve@mitre.org", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42536" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/42667" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/42783" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/42916" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-201101-02.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1024910" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2010/dsa-2136" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/45500" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3290" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0114" }, { "source": "cve@mitre.org", "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Dec-2010/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02128-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02220-alpha-out-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052657.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052690.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42916" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201101-02.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1024910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2010/dsa-2136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/3290" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0114" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gitweb.torproject.org/tor.git/blob/release-0.2.1:/ChangeLog" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-07 00:05
Modified
2025-04-03 01:03
Severity ?
Summary
Tor before 0.1.1.20 creates "internal circuits" primarily consisting of nodes with "useful exit nodes," which allows remote attackers to conduct unspecified statistical attacks.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/20277 | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
cve@mitre.org | http://tor.eff.org/cvs/tor/ChangeLog | ||
cve@mitre.org | http://www.osvdb.org/25882 | ||
cve@mitre.org | http://www.securityfocus.com/bid/18323 | Patch | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/26798 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20277 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tor.eff.org/cvs/tor/ChangeLog | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/25882 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/18323 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/26798 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 creates \"internal circuits\" primarily consisting of nodes with \"useful exit nodes,\" which allows remote attackers to conduct unspecified statistical attacks." }, { "lang": "es", "value": "Tor versiones anteriores a 0.1.1.20 crea \"circuitos internos\" principalmente consistentes en nodos con \"nodos de salida \u00fatil\", lo cual permite a atacantes remotos conducir ataques estad\u00edsticamente no especificados." } ], "id": "CVE-2006-3410", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20277" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25882" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/18323" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26798" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25882" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/18323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26798" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-02-03 23:30
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Jan-2009/msg00000.html | Exploit | |
cve@mitre.org | http://blog.torproject.org/blog/tor-0.2.0.33-stable-released | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/33635 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/33677 | ||
cve@mitre.org | http://secunia.com/advisories/34583 | ||
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200904-11.xml | ||
cve@mitre.org | http://www.securityfocus.com/bid/33399 | Patch | |
cve@mitre.org | http://www.securitytracker.com/id?1021633 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2009/0210 | ||
cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00902.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jan-2009/msg00000.html | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://blog.torproject.org/blog/tor-0.2.0.33-stable-released | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33635 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33677 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34583 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200904-11.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/33399 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1021633 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/0210 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00902.html |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10_alpha | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "C30E2B05-BD01-4F0B-9EDF-7701B6A14848", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:*:alpha:*:*:*:*:*:*", "matchCriteriaId": "821649FD-593C-47B8-874E-C3F8F6BC6E5F", "versionEndIncluding": "0.2.0.32", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Tor before 0.2.0.33 has unspecified impact and remote attack vectors that trigger heap corruption." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en Tor anterior a v0.2.0.33 tiene un impacto y vectores de ataque desconocidos que lanzan una corrupci\u00f3n de mont\u00edculo (heap)." } ], "id": "CVE-2009-0414", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-02-03T23:30:01.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://archives.seul.org/or/announce/Jan-2009/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.33-stable-released" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33635" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/33677" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34583" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/33399" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021633" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/0210" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00902.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.seul.org/or/announce/Jan-2009/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-0.2.0.33-stable-released" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/33677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/33399" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0210" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00902.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" }, { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-03-18 02:00
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service (exit node crash) via "malformed input."
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Feb-2009/msg00000.html | Patch | |
cve@mitre.org | http://secunia.com/advisories/33880 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/34583 | ||
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200904-11.xml | ||
cve@mitre.org | http://www.securityfocus.com/bid/33713 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/49323 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Feb-2009/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33880 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34583 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200904-11.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/33713 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/49323 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C390EF7-1A08-4BAD-8DA5-8402AA2AB7AE", "versionEndIncluding": "0.2.0.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service (exit node crash) via \"malformed input.\"" }, { "lang": "es", "value": "Vulnerabilidad no especificada en Tor anterior a v0.2.0.34 permite replicaciones de directorios que provocan una denegaci\u00f3n de servicio (ca\u00edda de nodo de salida) a trav\u00e9s \"entrada malformada\"." } ], "id": "CVE-2009-0938", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-18T02:00:08.217", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33880" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34583" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/33713" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/33713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49323" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-12-23 03:59
Modified
2025-04-11 00:51
Severity ?
Summary
Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blog.torproject.org/blog/tor-02234-released-security-patches | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.torproject.org/blog/tor-02234-released-security-patches | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.1.1.27 | |
tor | tor | 0.2.1.1.28 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.1.28 | |
tor | tor | 0.2.1.29 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A1ABD3E-1901-4DF7-9236-A21777840950", "versionEndIncluding": "0.2.2.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "281100EE-90F3-4814-B5E7-F625A84293FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "3FD46698-2192-4467-910C-8C859E00F889", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:beta:*:*:*:*:*:*", "matchCriteriaId": "AB3AABD7-3A09-4D00-8FDB-3955A5290926", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "24BC210B-6E30-4EF6-A6AA-86493E5F54C7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.34, when configured as a bridge, sets up circuits through a process different from the process used by a client, which makes it easier for remote attackers to enumerate bridges by observing circuit building." }, { "lang": "es", "value": "Las versiones de Tor anteriores a v0.2.2.34 cuando es configurado en modo puente, establece un circuito a trav\u00e9s de un proceso diferente al que es utilizado por el cliente, lo cual podr\u00eda permitir f\u00e1cilmente a atacantes remotos obtener una lista de los puntes por medio de la observaci\u00f3n del circuito que se ha construido." } ], "id": "CVE-2011-4895", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-23T03:59:22.097", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-07 00:05
Modified
2025-04-03 01:03
Severity ?
Summary
Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200606-04.xml | Patch, Vendor Advisory | |
cve@mitre.org | http://tor.eff.org/cvs/tor/ChangeLog | ||
cve@mitre.org | http://www.osvdb.org/25874 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200606-04.xml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://tor.eff.org/cvs/tor/ChangeLog | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/25874 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 does not sufficiently obey certain firewall options, which allows remote attackers to bypass intended access restrictions for dirservers, direct connections, or proxy servers." }, { "lang": "es", "value": "Tor anterior a 0.1.1.20 no sigue correctamente determinadas opciones del cortafuegos, esto permite a atacantes remotos evitar las restricciones de acceso pretendidas para los dirservers (servidores de directorios), conexiones directas o servidores proxy." } ], "id": "CVE-2006-3412", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25874" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25874" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-03-18 02:00
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service via unknown vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Feb-2009/msg00000.html | Patch | |
cve@mitre.org | http://secunia.com/advisories/33880 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/34583 | ||
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200904-11.xml | ||
cve@mitre.org | http://www.securityfocus.com/bid/33713 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Feb-2009/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33880 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34583 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200904-11.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/33713 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C390EF7-1A08-4BAD-8DA5-8402AA2AB7AE", "versionEndIncluding": "0.2.0.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Tor before 0.2.0.34 allows directory mirrors to cause a denial of service via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en Tor anterior a v0.2.0.34 permite replicaciones de directorio que provocan una denegaci\u00f3n de servicio a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2009-0937", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-18T02:00:08.203", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33880" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34583" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/33713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/33713" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-06-28 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Unknown vulnerability in Tor before 0.1.0.10 allows remote attackers to read arbitrary memory and possibly key information from the exit server's process space.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Jun-2005/msg00001.html | Patch | |
cve@mitre.org | http://bugs.gentoo.org/show_bug.cgi?id=96320 | Patch | |
cve@mitre.org | http://secunia.com/advisories/15764/ | Patch, Vendor Advisory | |
cve@mitre.org | http://www.gentoo.org/security/en/glsa/glsa-200506-18.xml | Patch, Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/21093 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jun-2005/msg00001.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://bugs.gentoo.org/show_bug.cgi?id=96320 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/15764/ | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-200506-18.xml | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/21093 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unknown vulnerability in Tor before 0.1.0.10 allows remote attackers to read arbitrary memory and possibly key information from the exit server\u0027s process space." } ], "id": "CVE-2005-2050", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-06-28T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jun-2005/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=96320" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/15764/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200506-18.xml" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jun-2005/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=96320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/15764/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200506-18.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21093" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-30 21:17
Modified
2025-04-09 00:30
Severity ?
Summary
Tor before 0.1.2.15 does not properly distinguish "streamids from different exits," which might allow remote attackers with control over Tor routers to inject cells into arbitrary streams.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Jul-2007/msg00000.html | Patch | |
cve@mitre.org | http://osvdb.org/46970 | ||
cve@mitre.org | http://secunia.com/advisories/26140 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/25035 | Patch | |
cve@mitre.org | http://www.vupen.com/english/advisories/2007/2634 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jul-2007/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/46970 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26140 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/25035 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/2634 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.14 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.15 does not properly distinguish \"streamids from different exits,\" which might allow remote attackers with control over Tor routers to inject cells into arbitrary streams." }, { "lang": "es", "value": "Tor anterior a 0.1.2.15 no distingue de forma adecuada \"identificadores de tr\u00e1fico de diversas salidas,\" lo cual podr\u00eda permitir a atacantes remotos con control sobre los routers Tor inyectar celdas dentro de tr\u00e1fico de su elecci\u00f3n." } ], "id": "CVE-2007-4098", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-30T21:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/46970" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26140" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25035" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/46970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2634" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-01-19 12:00
Modified
2025-04-11 00:51
Severity ?
Summary
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Jan-2011/msg00000.html | Patch | |
cve@mitre.org | http://blog.torproject.org/blog/tor-02129-released-security-patches | Patch | |
cve@mitre.org | http://www.securityfocus.com/bid/45953 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/64864 | ||
cve@mitre.org | https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | Patch | |
cve@mitre.org | https://trac.torproject.org/projects/tor/ticket/2352 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jan-2011/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://blog.torproject.org/blog/tor-02129-released-security-patches | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/45953 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/64864 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://trac.torproject.org/projects/tor/ticket/2352 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBA88C1D-CC02-4808-B981-DCD64917CD41", "versionEndIncluding": "0.2.1.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values." }, { "lang": "es", "value": "Tor antes de v0.2.1.29 y v0.2.2.x antes de v0.2.2.21-alfa podr\u00eda permitir a atacantes remotos provocar una denegaci\u00f3n de servicio (error de aserci\u00f3n y salida del demonio) a trav\u00e9s de vectores relacionados con caches de Router mal formados y el tratamiento inadecuado de valores enteros." } ], "id": "CVE-2011-0493", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-19T12:00:21.343", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/45953" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64864" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "cve@mitre.org", "url": "https://trac.torproject.org/projects/tor/ticket/2352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64864" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://trac.torproject.org/projects/tor/ticket/2352" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-07 00:05
Modified
2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote attackers to cause an unspecified denial of service via unknown vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/20277 | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
cve@mitre.org | http://tor.eff.org/cvs/tor/ChangeLog | ||
cve@mitre.org | http://www.osvdb.org/25883 | ||
cve@mitre.org | http://www.securityfocus.com/bid/18323 | Patch | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/26794 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20277 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tor.eff.org/cvs/tor/ChangeLog | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/25883 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/18323 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/26794 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the directory server (dirserver) in Tor before 0.1.1.20 allows remote attackers to cause an unspecified denial of service via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en el servidor de directorios (dirserver) en Tor antes de 0.1.1.20 permite a atacantes remotos provocar una denegaci\u00f3n de servicio no especificada a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2006-3408", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20277" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25883" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/18323" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26794" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25883" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/18323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26794" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-12-23 03:59
Modified
2025-04-11 00:51
Severity ?
Summary
Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.debian.org/security/2011/dsa-2331 | ||
cve@mitre.org | https://blog.torproject.org/blog/tor-02234-released-security-patches | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2331 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://blog.torproject.org/blog/tor-02234-released-security-patches | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.1.1.27 | |
tor | tor | 0.2.1.1.28 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.1.28 | |
tor | tor | 0.2.1.29 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A1ABD3E-1901-4DF7-9236-A21777840950", "versionEndIncluding": "0.2.2.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "281100EE-90F3-4814-B5E7-F625A84293FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "3FD46698-2192-4467-910C-8C859E00F889", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:beta:*:*:*:*:*:*", "matchCriteriaId": "AB3AABD7-3A09-4D00-8FDB-3955A5290926", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "24BC210B-6E30-4EF6-A6AA-86493E5F54C7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.34, when configured as a client or bridge, sends a TLS certificate chain as part of an outgoing OR connection, which allows remote relays to bypass intended anonymity properties by reading this chain and then determining the set of entry guards that the client or bridge had selected." }, { "lang": "es", "value": "Tor, antes de v0.2.2.34, cuando se configura como cliente o bridge, env\u00eda una cadena de certificado TLS como parte de una conexi\u00f3n saliente OR, lo que permite a relays remotos evitar la anonimidad intencionada cuando se determina un conjunto de guardas de entrada seleccionadas por el cliente o bridge." } ], "id": "CVE-2011-2768", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-23T03:59:21.957", "references": [ { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2331" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-12-23 03:59
Modified
2025-04-11 00:51
Severity ?
Summary
Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.debian.org/security/2011/dsa-2331 | ||
cve@mitre.org | https://blog.torproject.org/blog/tor-02234-released-security-patches | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2331 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://blog.torproject.org/blog/tor-02234-released-security-patches | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.1.1.27 | |
tor | tor | 0.2.1.1.28 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.1.28 | |
tor | tor | 0.2.1.29 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A1ABD3E-1901-4DF7-9236-A21777840950", "versionEndIncluding": "0.2.2.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "281100EE-90F3-4814-B5E7-F625A84293FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "3FD46698-2192-4467-910C-8C859E00F889", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:beta:*:*:*:*:*:*", "matchCriteriaId": "AB3AABD7-3A09-4D00-8FDB-3955A5290926", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "24BC210B-6E30-4EF6-A6AA-86493E5F54C7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.34, when configured as a bridge, accepts the CREATE and CREATE_FAST values in the Command field of a cell within an OR connection that it initiated, which allows remote relays to enumerate bridges by using these values." }, { "lang": "es", "value": "Tor antes de v0.2.2.34, cuando se configura como bridge, acepta los valores CREATE y CREATE_FAST en el campo Command de una conexi\u00f3n OR que inicializa, lo que permite a relays remotos enumerar bridges usando esos valores." } ], "id": "CVE-2011-2769", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-23T03:59:21.990", "references": [ { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2331" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-01-19 12:00
Modified
2025-04-11 00:51
Severity ?
Summary
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Jan-2011/msg00000.html | Patch | |
cve@mitre.org | http://blog.torproject.org/blog/tor-02129-released-security-patches | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/45953 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/64889 | ||
cve@mitre.org | https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | Patch | |
cve@mitre.org | https://trac.torproject.org/projects/tor/ticket/2190 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jan-2011/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://blog.torproject.org/blog/tor-02129-released-security-patches | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/45953 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/64889 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://trac.torproject.org/projects/tor/ticket/2190 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBA88C1D-CC02-4808-B981-DCD64917CD41", "versionEndIncluding": "0.2.1.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages." }, { "lang": "es", "value": "Tor antes de v0.2.1.29 y v0.2.2.x antes de v0.2.2.21-alfa realiza llamadas a libevent dentro de manejadores de log de libevent, que podr\u00eda permitir a atacantes remotos provocar una denegaci\u00f3n de servicio (por ca\u00edda del demonio) a trav\u00e9s de vectores que lanzan ciertos mensajes de log." } ], "id": "CVE-2011-0490", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-19T12:00:19.920", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/45953" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64889" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "cve@mitre.org", "url": "https://trac.torproject.org/projects/tor/ticket/2190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45953" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://trac.torproject.org/projects/tor/ticket/2190" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-07-30 21:17
Modified
2025-04-09 00:30
Severity ?
Summary
Tor before 0.1.2.15 sends "destroy cells" containing the reason for tearing down a circuit, which allows remote attackers to obtain sensitive information, contrary to specifications.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Jul-2007/msg00000.html | Patch | |
cve@mitre.org | http://osvdb.org/46969 | ||
cve@mitre.org | http://secunia.com/advisories/26140 | Patch, Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/25035 | Patch | |
cve@mitre.org | http://www.vupen.com/english/advisories/2007/2634 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jul-2007/msg00000.html | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/46969 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/26140 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/25035 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/2634 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.14 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.2.15 sends \"destroy cells\" containing the reason for tearing down a circuit, which allows remote attackers to obtain sensitive information, contrary to specifications." }, { "lang": "es", "value": "Tor anterior a 0.1.2.15 env\u00eda \"destruir celdas\" conteniendo la raz\u00f3n para derribar un circuito, lo cual podr\u00eda permite a un atacante remoto obtener informaci\u00f3n sensible, contraria a las especificaciones." } ], "id": "CVE-2007-4097", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-07-30T21:17:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/46969" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26140" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25035" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/2634" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://archives.seul.org/or/announce/Jul-2007/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/46969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/26140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/25035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/2634" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-01-25 19:30
Modified
2025-04-11 00:51
Severity ?
Summary
Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Jan-2010/msg00000.html | ||
cve@mitre.org | http://archives.seul.org/or/talk/Jan-2010/msg00162.html | ||
cve@mitre.org | http://secunia.com/advisories/38198 | Vendor Advisory | |
cve@mitre.org | http://www.osvdb.org/61865 | ||
cve@mitre.org | http://www.securityfocus.com/bid/37901 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jan-2010/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/talk/Jan-2010/msg00162.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38198 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/61865 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/37901 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10_alpha | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1_alpha-cvs | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1_alpha-cvs:*:*:*:*:*:*:*", "matchCriteriaId": "197BFA5D-8C65-4F59-B4A0-B6AB7B11EC07", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.22, and 0.2.2.x before 0.2.2.7-alpha, when functioning as a bridge directory authority, allows remote attackers to obtain sensitive information about bridge identities and bridge descriptors via a dbg-stability.txt directory query." }, { "lang": "es", "value": "Tor anterior a v0.2.1.22, y 0.2.2.x anteriores a v0.2.2.7-alpha, cuando funciona como autoridad de directorio puente, permite a atacantes remotos obtener informaci\u00f3n sensible acerca de las identidades y descriptores puente a trav\u00e9s de una consulta al directorio dbg-stability.txt." } ], "id": "CVE-2010-0385", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-01-25T19:30:01.697", "references": [ { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38198" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/61865" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/37901" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/announce/Jan-2010/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/talk/Jan-2010/msg00162.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/61865" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/37901" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-02-26 17:28
Modified
2025-04-09 00:30
Severity ?
Summary
Tor does not verify a node's uptime and bandwidth advertisements, which allows remote attackers who operate a low resource node to make false claims of greater resources, which places the node into use for many circuits and compromises the anonymity of traffic sources and destinations.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/talk/Feb-2007/msg00197.html | ||
cve@mitre.org | http://archives.seul.org/or/talk/Feb-2007/msg00200.html | ||
cve@mitre.org | http://archives.seul.org/or/talk/Feb-2007/msg00202.html | ||
cve@mitre.org | http://osvdb.org/45249 | ||
cve@mitre.org | http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/talk/Feb-2007/msg00197.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/talk/Feb-2007/msg00200.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/talk/Feb-2007/msg00202.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/45249 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5284A61-BC5E-414D-BCFD-3844D0478CC1", "versionEndIncluding": "0.1.1.26", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor does not verify a node\u0027s uptime and bandwidth advertisements, which allows remote attackers who operate a low resource node to make false claims of greater resources, which places the node into use for many circuits and compromises the anonymity of traffic sources and destinations." }, { "lang": "es", "value": "Tor no verifica el tiempo de funcionamiento y los anuncios de ancho de banda, lo cual permite a atacantes remotos que operan un nodo con bajos recursos afirmar que poseen recursos mayores, lo cual pone el nodo en uso para muchos circuitos y compromete el anonimato de las fuentes y los destinos del tr\u00e1fico." } ], "id": "CVE-2007-1103", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-02-26T17:28:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00197.html" }, { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00200.html" }, { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00202.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/45249" }, { "source": "cve@mitre.org", "url": "http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00197.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00200.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/talk/Feb-2007/msg00202.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/45249" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.cs.colorado.edu/department/publications/reports/docs/CU-CS-1025-07.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-02-20 19:30
Modified
2025-04-09 00:30
Severity ?
Summary
Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router. NOTE: the vendor disputes the significance of this issue, noting that the product's design "accepted end-to-end correlation as an attack that is too expensive to solve."
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://blog.torproject.org/blog/one-cell-enough | ||
cve@mitre.org | http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu | ||
cve@mitre.org | http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://blog.torproject.org/blog/one-cell-enough | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf | Exploit |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:alpha:*:*:*:*:*:*", "matchCriteriaId": "95A5691B-621A-4B7D-8F83-2C95DF30EF60", "versionEndIncluding": "0.2.0.34", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor 0.2.0.28, and probably 0.2.0.34 and earlier, allows remote attackers, with control of an entry router and an exit router, to confirm that a sender and receiver are communicating via vectors involving (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, and then observing cell recognition errors at the exit router. NOTE: the vendor disputes the significance of this issue, noting that the product\u0027s design \"accepted end-to-end correlation as an attack that is too expensive to solve.\"" }, { "lang": "es", "value": "Tor v0.2.0.28, y posiblemente v0.2.0.34 y anteriores, permite a atacantes remotos, con el control de un enrutador de salida y otro de entrada, confirmar que un receptor y un remitente estan comunicandose a traves de los vectores (1) replaying, (2) modifying, (3) inserting, or (4) deleting a single cell, y despues observar los errores de reconocimiento de celula en el enrutador de salida. NOTA: El vendedor no esta de acuerda con la importancia de este hecho." } ], "id": "CVE-2009-0654", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-02-20T19:30:00.313", "references": [ { "source": "cve@mitre.org", "url": "http://blog.torproject.org/blog/one-cell-enough" }, { "source": "cve@mitre.org", "url": "http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blog.torproject.org/blog/one-cell-enough" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.blackhat.com/html/bh-dc-09/bh-dc-09-archives.html#Fu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.blackhat.com/presentations/bh-dc-09/Fu/BlackHat-DC-09-Fu-Break-Tors-Anonymity.pdf" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-12-23 03:59
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.debian.org/security/2011/dsa-2363 | ||
cve@mitre.org | https://blog.torproject.org/blog/tor-02235-released-security-patches | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2363 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://blog.torproject.org/blog/tor-02235-released-security-patches | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.1.1.27 | |
tor | tor | 0.2.1.1.28 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.1.28 | |
tor | tor | 0.2.1.29 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.32 | |
tor | tor | 0.2.2.33 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD951703-0E72-48AE-B16F-408BFE2B638E", "versionEndIncluding": "0.2.2.34", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "281100EE-90F3-4814-B5E7-F625A84293FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "3FD46698-2192-4467-910C-8C859E00F889", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:beta:*:*:*:*:*:*", "matchCriteriaId": "AB3AABD7-3A09-4D00-8FDB-3955A5290926", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "24BC210B-6E30-4EF6-A6AA-86493E5F54C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.33:*:*:*:*:*:*:*", "matchCriteriaId": "E7B83A6E-9C87-4E79-94C6-E61EE5584F84", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple heap-based buffer overflows in Tor before 0.2.2.35 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code by (1) establishing a SOCKS connection to SocksPort or (2) leveraging a SOCKS proxy configuration." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de buffer de memoria din\u00e1mica en versiones anteriores a v0.2.2.35 de Tor que permite a atacantes remotos causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) o una posible ejecuci\u00f3n de c\u00f3digo de su elecci\u00f3n mediante (1) el establecimiento de una conexi\u00f3n STOKS a un puerto SocksPort o (2) aprovechando una configuraci\u00f3n de proxy STOKS." } ], "id": "CVE-2011-2778", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-23T03:59:22.020", "references": [ { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2363" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02235-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2363" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02235-released-security-patches" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-12-23 03:59
Modified
2025-04-11 00:51
Severity ?
Summary
Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by observing DirPort connections.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://blog.torproject.org/blog/tor-02234-released-security-patches | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://blog.torproject.org/blog/tor-02234-released-security-patches | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.1.1 | |
tor | tor | 0.2.1.1.2 | |
tor | tor | 0.2.1.1.3 | |
tor | tor | 0.2.1.1.4 | |
tor | tor | 0.2.1.1.5 | |
tor | tor | 0.2.1.1.6 | |
tor | tor | 0.2.1.1.7 | |
tor | tor | 0.2.1.1.8 | |
tor | tor | 0.2.1.1.9 | |
tor | tor | 0.2.1.1.10 | |
tor | tor | 0.2.1.1.11 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.12 | |
tor | tor | 0.2.1.1.13 | |
tor | tor | 0.2.1.1.14 | |
tor | tor | 0.2.1.1.15 | |
tor | tor | 0.2.1.1.16 | |
tor | tor | 0.2.1.1.17 | |
tor | tor | 0.2.1.1.18 | |
tor | tor | 0.2.1.1.19 | |
tor | tor | 0.2.1.1.20 | |
tor | tor | 0.2.1.1.21 | |
tor | tor | 0.2.1.1.22 | |
tor | tor | 0.2.1.1.23 | |
tor | tor | 0.2.1.1.24 | |
tor | tor | 0.2.1.1.25 | |
tor | tor | 0.2.1.1.26 | |
tor | tor | 0.2.1.1.27 | |
tor | tor | 0.2.1.1.28 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.1.28 | |
tor | tor | 0.2.1.29 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.29 | |
tor | tor | 0.2.2.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A1ABD3E-1901-4DF7-9236-A21777840950", "versionEndIncluding": "0.2.2.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "E149062A-F48E-4E99-8A3C-B32FFC922695", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "67AF751E-3C14-4B67-9E24-DBD14E00D72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "02525A8C-2384-409C-8D94-13D8E30904EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "04955D07-0755-473C-AD6A-1AC5B158E387", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "810D53DA-CACC-4432-B8E5-C42464B316C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "334049F0-332B-4736-B0C9-45B0C1289F22", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "9F8D1841-FDBB-4507-B092-F41C49285B41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "02937401-0114-4D9C-9FDE-E299CC55FC9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "59C66307-DB75-40C2-8AB6-538C9E35E141", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "1BBF6A17-43CC-4E14-AC2F-DC6C46B98A41", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "E511EB2D-7E75-45BC-B446-4CD0FFB7016E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC7FC78-6BD8-427E-937D-BD6B4ED7FADF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "1EF56621-A858-4881-8A07-27EE371540DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "0B9D629C-8D14-490B-A7FA-E765F51226EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CF9864C9-EB23-4859-831B-AE862D8DD0DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "7EFB8A30-879D-4150-B9CB-4DFAFCF8572D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "F98E5DC9-4D9E-4EC9-99F7-748DC7876443", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "0E4DF23E-E1CA-4A12-A8CA-64C26EE819BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B7DA057A-55C0-4A97-95F0-A0B7217DC6BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "430018D6-9DAE-40B6-A128-E4022C70B41C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "7E786576-91B9-4EA1-9A7E-B0DE04B87D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "E5F27C22-48C3-4453-B84B-00CB06B745A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "D1E803BD-8191-449A-B48E-A97DD6F7C3F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "EB0956E0-5A7F-4DA5-8F71-2226EDE9A9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "54AE55C4-F3C2-403A-B581-A7E174F6FC0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "D5ABB714-CF7E-44F5-BB4F-C428CB3D14FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "25C41E2D-3C63-4F83-8EF0-99DDA656C276", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "5EF7556A-8845-4515-A760-024552EDACD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "DB6D57D7-E9C7-47D6-AC84-09960BC07723", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "B081491D-3080-4EDA-9A48-64CF13DE0F81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "142C73E5-B6A1-4D12-832D-01CF3BB5DC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "281100EE-90F3-4814-B5E7-F625A84293FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "3FD46698-2192-4467-910C-8C859E00F889", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.29:beta:*:*:*:*:*:*", "matchCriteriaId": "AB3AABD7-3A09-4D00-8FDB-3955A5290926", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "24BC210B-6E30-4EF6-A6AA-86493E5F54C7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.2.34, when configured as a bridge, uses direct DirPort access instead of a Tor TLS connection for a directory fetch, which makes it easier for remote attackers to enumerate bridges by observing DirPort connections." }, { "lang": "es", "value": "Las versiones de Tor anteriores a v0.2.2.34, cuando son configuradas en modo puente, utilizan el acceso directo a DirPort en vez de una conexi\u00f3n TLS a Tor para un directorio localizado, lo cual puede provocar que un atacante remoto pueda obtener una lista de los puentes por medio de la observaci\u00f3n de las conexiones a trav\u00e9s del puerto DirPort." } ], "id": "CVE-2011-4894", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-23T03:59:22.067", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://blog.torproject.org/blog/tor-02234-released-security-patches" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-07 00:05
Modified
2025-04-03 01:03
Severity ?
Summary
Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/20277 | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
cve@mitre.org | http://tor.eff.org/cvs/tor/ChangeLog | ||
cve@mitre.org | http://www.securityfocus.com/bid/18323 | Patch | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/26795 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20277 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tor.eff.org/cvs/tor/ChangeLog | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/18323 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/26795 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer overflow in Tor before 0.1.1.20 allows remote attackers to execute arbitrary code via crafted large inputs, which result in a buffer overflow when elements are added to smartlists." }, { "lang": "es", "value": "Desbordamiento de entero en Tor versiones anteriores a la 0.1.1.20, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de entradas largas manipuladas, lo cual provoca un desbordamiento de b\u00fafer cuando se a\u00f1aden elementos a las smartlists" } ], "id": "CVE-2006-3409", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20277" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/18323" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/18323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26795" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-03-18 02:00
Modified
2025-04-09 00:30
Severity ?
Summary
Tor before 0.2.0.34 treats incomplete IPv4 addresses as valid, which has unknown impact and attack vectors related to "Spec conformance," as demonstrated using 192.168.0.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.seul.org/or/announce/Feb-2009/msg00000.html | ||
cve@mitre.org | http://secunia.com/advisories/33880 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/34583 | ||
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200904-11.xml | ||
cve@mitre.org | http://www.securityfocus.com/bid/33713 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Feb-2009/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/33880 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34583 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200904-11.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/33713 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C390EF7-1A08-4BAD-8DA5-8402AA2AB7AE", "versionEndIncluding": "0.2.0.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.0.34 treats incomplete IPv4 addresses as valid, which has unknown impact and attack vectors related to \"Spec conformance,\" as demonstrated using 192.168.0." }, { "lang": "es", "value": "Tor anterior a v0.2.0.34 trata direcciones IPv4 incompletas como validas, lo que tiene un impacto desconocido y vectores de ataque relacionados con \"Spec conformance,\" como se ha demostrado utilizando 192.168.0." } ], "id": "CVE-2009-0939", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-18T02:00:08.233", "references": [ { "source": "cve@mitre.org", "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33880" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34583" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/33713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/announce/Feb-2009/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/33880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200904-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/33713" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-07-07 00:05
Modified
2025-04-03 01:03
Severity ?
Summary
Tor before 0.1.1.20 supports server descriptors that contain hostnames instead of IP addresses, which allows remote attackers to arbitrarily group users by providing preferential address resolution.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
cve@mitre.org | http://tor.eff.org/cvs/tor/ChangeLog | ||
cve@mitre.org | http://www.osvdb.org/25877 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20514 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200606-04.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://tor.eff.org/cvs/tor/ChangeLog | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/25877 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.0.18 | |
tor | tor | 0.1.0.19 | |
tor | tor | 0.1.1.1_alpha | |
tor | tor | 0.1.1.2_alpha | |
tor | tor | 0.1.1.3_alpha | |
tor | tor | 0.1.1.4_alpha | |
tor | tor | 0.1.1.5_alpha | |
tor | tor | 0.1.1.6_alpha | |
tor | tor | 0.1.1.7_alpha | |
tor | tor | 0.1.1.8_alpha | |
tor | tor | 0.1.1.9_alpha | |
tor | tor | 0.1.1.10_alpha |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "D4E6BA17-6AE9-45ED-A8C3-F79463F427BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D396C-36CA-4579-BCA0-672440CB5CCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "811CE708-CEE6-4B0F-98E5-E138C06EA382", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "6860F802-FEC2-449A-A5FC-AFACCA8633CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "A4CA23F0-7C49-430E-AD20-7C7BDCC1EEC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4D9E677-01D2-4800-82AA-F5585475D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "9C589D4F-60B3-450B-860A-9975BB47BBE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "DA331167-6A2F-402F-A28F-9EE7B6F20207", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "F42AB6B3-7BD8-4B55-B269-DCA664A25FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D4740B10-EFB8-4F79-88C1-9B6F5897A71C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "31CA7556-D132-4E81-8E13-C7E025AF20AD", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10_alpha:*:*:*:*:*:*:*", "matchCriteriaId": "D224FA8D-4C5A-48BE-92F2-1EC57782046D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.1.1.20 supports server descriptors that contain hostnames instead of IP addresses, which allows remote attackers to arbitrarily group users by providing preferential address resolution." }, { "lang": "es", "value": "Tor anterior a 0.1.1.20 soporta descriptores de servidor que contienen nombres de equipos en lugar de direcciones IP, lo que permite a los atacantes remotos, agrupar usuarios de forma arbitraria, facilitando la resoluci\u00f3n de direcciones preferencial.\r\n\r\n" } ], "id": "CVE-2006-3414", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-07T00:05:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "cve@mitre.org", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/25877" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/20514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200606-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://tor.eff.org/cvs/tor/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25877" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-01-19 12:00
Modified
2025-04-11 00:51
Severity ?
Summary
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://archives.seul.org/or/announce/Jan-2011/msg00000.html | ||
secalert@redhat.com | http://blog.torproject.org/blog/tor-02129-released-security-patches | Patch, Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/42905 | Vendor Advisory | |
secalert@redhat.com | http://secunia.com/advisories/42907 | Vendor Advisory | |
secalert@redhat.com | http://www.debian.org/security/2011/dsa-2148 | ||
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2011/01/18/7 | ||
secalert@redhat.com | http://www.securityfocus.com/bid/45832 | ||
secalert@redhat.com | http://www.securitytracker.com/id?1024980 | ||
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0131 | Vendor Advisory | |
secalert@redhat.com | http://www.vupen.com/english/advisories/2011/0132 | Vendor Advisory | |
secalert@redhat.com | https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | ||
secalert@redhat.com | https://trac.torproject.org/projects/tor/ticket/2384 | ||
secalert@redhat.com | https://trac.torproject.org/projects/tor/ticket/2385 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.seul.org/or/announce/Jan-2011/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://blog.torproject.org/blog/tor-02129-released-security-patches | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42905 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/42907 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2148 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2011/01/18/7 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/45832 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1024980 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0131 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0132 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog | ||
af854a3a-2127-422b-91ae-364da2661108 | https://trac.torproject.org/projects/tor/ticket/2384 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://trac.torproject.org/projects/tor/ticket/2385 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
tor | tor | * | |
tor | tor | 0.0.2 | |
tor | tor | 0.0.2_pre13 | |
tor | tor | 0.0.2_pre14 | |
tor | tor | 0.0.2_pre15 | |
tor | tor | 0.0.2_pre16 | |
tor | tor | 0.0.2_pre17 | |
tor | tor | 0.0.2_pre18 | |
tor | tor | 0.0.2_pre19 | |
tor | tor | 0.0.2_pre20 | |
tor | tor | 0.0.2_pre21 | |
tor | tor | 0.0.2_pre22 | |
tor | tor | 0.0.2_pre23 | |
tor | tor | 0.0.2_pre24 | |
tor | tor | 0.0.2_pre25 | |
tor | tor | 0.0.2_pre26 | |
tor | tor | 0.0.2_pre27 | |
tor | tor | 0.0.3 | |
tor | tor | 0.0.4 | |
tor | tor | 0.0.5 | |
tor | tor | 0.0.6 | |
tor | tor | 0.0.6.1 | |
tor | tor | 0.0.6.2 | |
tor | tor | 0.0.7 | |
tor | tor | 0.0.7.1 | |
tor | tor | 0.0.7.2 | |
tor | tor | 0.0.7.3 | |
tor | tor | 0.0.8 | |
tor | tor | 0.0.8.1 | |
tor | tor | 0.0.9 | |
tor | tor | 0.0.9.1 | |
tor | tor | 0.0.9.2 | |
tor | tor | 0.0.9.3 | |
tor | tor | 0.0.9.4 | |
tor | tor | 0.0.9.5 | |
tor | tor | 0.0.9.6 | |
tor | tor | 0.0.9.7 | |
tor | tor | 0.0.9.8 | |
tor | tor | 0.0.9.9 | |
tor | tor | 0.0.9.10 | |
tor | tor | 0.1.0.1 | |
tor | tor | 0.1.0.2 | |
tor | tor | 0.1.0.3 | |
tor | tor | 0.1.0.4 | |
tor | tor | 0.1.0.5 | |
tor | tor | 0.1.0.6 | |
tor | tor | 0.1.0.7 | |
tor | tor | 0.1.0.8 | |
tor | tor | 0.1.0.9 | |
tor | tor | 0.1.0.10 | |
tor | tor | 0.1.0.11 | |
tor | tor | 0.1.0.12 | |
tor | tor | 0.1.0.13 | |
tor | tor | 0.1.0.14 | |
tor | tor | 0.1.0.15 | |
tor | tor | 0.1.0.16 | |
tor | tor | 0.1.0.17 | |
tor | tor | 0.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.1 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.2 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.3 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.4 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.5 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.6 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.7 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.8 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.9 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.10 | |
tor | tor | 0.1.1.11 | |
tor | tor | 0.1.1.12 | |
tor | tor | 0.1.1.13 | |
tor | tor | 0.1.1.14 | |
tor | tor | 0.1.1.15 | |
tor | tor | 0.1.1.16 | |
tor | tor | 0.1.1.17 | |
tor | tor | 0.1.1.18 | |
tor | tor | 0.1.1.19 | |
tor | tor | 0.1.1.20 | |
tor | tor | 0.1.1.21 | |
tor | tor | 0.1.1.22 | |
tor | tor | 0.1.1.23 | |
tor | tor | 0.1.1.25 | |
tor | tor | 0.1.1.26 | |
tor | tor | 0.1.2.1 | |
tor | tor | 0.1.2.2 | |
tor | tor | 0.1.2.3 | |
tor | tor | 0.1.2.4 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.5 | |
tor | tor | 0.1.2.6 | |
tor | tor | 0.1.2.7 | |
tor | tor | 0.1.2.8 | |
tor | tor | 0.1.2.9 | |
tor | tor | 0.1.2.10 | |
tor | tor | 0.1.2.11 | |
tor | tor | 0.1.2.12 | |
tor | tor | 0.1.2.13 | |
tor | tor | 0.1.2.14 | |
tor | tor | 0.1.2.15 | |
tor | tor | 0.1.2.16 | |
tor | tor | 0.1.2.17 | |
tor | tor | 0.1.2.18 | |
tor | tor | 0.1.2.19 | |
tor | tor | 0.1.2.30 | |
tor | tor | 0.1.2.31 | |
tor | tor | 0.2.0.1 | |
tor | tor | 0.2.0.2 | |
tor | tor | 0.2.0.3 | |
tor | tor | 0.2.0.4 | |
tor | tor | 0.2.0.5 | |
tor | tor | 0.2.0.6 | |
tor | tor | 0.2.0.7 | |
tor | tor | 0.2.0.8 | |
tor | tor | 0.2.0.9 | |
tor | tor | 0.2.0.10 | |
tor | tor | 0.2.0.11 | |
tor | tor | 0.2.0.12 | |
tor | tor | 0.2.0.13 | |
tor | tor | 0.2.0.14 | |
tor | tor | 0.2.0.15 | |
tor | tor | 0.2.0.16 | |
tor | tor | 0.2.0.17 | |
tor | tor | 0.2.0.18 | |
tor | tor | 0.2.0.19 | |
tor | tor | 0.2.0.20 | |
tor | tor | 0.2.0.21 | |
tor | tor | 0.2.0.22 | |
tor | tor | 0.2.0.23 | |
tor | tor | 0.2.0.24 | |
tor | tor | 0.2.0.25 | |
tor | tor | 0.2.0.26 | |
tor | tor | 0.2.0.27 | |
tor | tor | 0.2.0.28 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.29 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.30 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.31 | |
tor | tor | 0.2.0.32 | |
tor | tor | 0.2.0.33 | |
tor | tor | 0.2.0.34 | |
tor | tor | 0.2.0.35 | |
tor | tor | 0.2.1.1 | |
tor | tor | 0.2.1.2 | |
tor | tor | 0.2.1.3 | |
tor | tor | 0.2.1.4 | |
tor | tor | 0.2.1.5 | |
tor | tor | 0.2.1.6 | |
tor | tor | 0.2.1.7 | |
tor | tor | 0.2.1.8 | |
tor | tor | 0.2.1.9 | |
tor | tor | 0.2.1.10 | |
tor | tor | 0.2.1.11 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.12 | |
tor | tor | 0.2.1.13 | |
tor | tor | 0.2.1.14 | |
tor | tor | 0.2.1.15 | |
tor | tor | 0.2.1.16 | |
tor | tor | 0.2.1.17 | |
tor | tor | 0.2.1.18 | |
tor | tor | 0.2.1.19 | |
tor | tor | 0.2.1.20 | |
tor | tor | 0.2.1.21 | |
tor | tor | 0.2.1.22 | |
tor | tor | 0.2.1.23 | |
tor | tor | 0.2.1.24 | |
tor | tor | 0.2.1.25 | |
tor | tor | 0.2.1.26 | |
tor | tor | 0.2.1.27 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.1 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.2 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.3 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.4 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.5 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.6 | |
tor | tor | 0.2.2.7 | |
tor | tor | 0.2.2.8 | |
tor | tor | 0.2.2.9 | |
tor | tor | 0.2.2.10 | |
tor | tor | 0.2.2.11 | |
tor | tor | 0.2.2.12 | |
tor | tor | 0.2.2.13 | |
tor | tor | 0.2.2.14 | |
tor | tor | 0.2.2.15 | |
tor | tor | 0.2.2.16 | |
tor | tor | 0.2.2.17 | |
tor | tor | 0.2.2.18 | |
tor | tor | 0.2.2.19 | |
tor | tor | 0.2.2.20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tor:tor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBA88C1D-CC02-4808-B981-DCD64917CD41", "versionEndIncluding": "0.2.1.28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "FD529C5A-D6E8-4FFD-B552-B91A9BD409F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre13:*:*:*:*:*:*:*", "matchCriteriaId": "4490AC9B-E8D8-4C97-866B-AB76AB2536F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre14:*:*:*:*:*:*:*", "matchCriteriaId": "0DBA48C9-C0CA-41C8-BDD3-0E69ED7AAC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre15:*:*:*:*:*:*:*", "matchCriteriaId": "9A8970D3-4C0B-4B6F-BEB4-08FF20FAEBF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre16:*:*:*:*:*:*:*", "matchCriteriaId": "2A2A2B60-8D31-4B59-8407-9CE62709906A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre17:*:*:*:*:*:*:*", "matchCriteriaId": "CDE02B1D-AA25-4364-8E54-583A0304FA69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre18:*:*:*:*:*:*:*", "matchCriteriaId": "DE3AB095-3F57-4922-BC12-0842FA158555", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre19:*:*:*:*:*:*:*", "matchCriteriaId": "F066E4A3-BE6F-4FF7-AE7A-C8E3A33D7197", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre20:*:*:*:*:*:*:*", "matchCriteriaId": "811FD436-8BD2-463A-8072-A915FFCA33C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre21:*:*:*:*:*:*:*", "matchCriteriaId": "83F107CD-7334-4D9D-AEFF-FA5F8DE72576", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre22:*:*:*:*:*:*:*", "matchCriteriaId": "07EB2211-D97D-47EF-94D1-01E7A3879BC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre23:*:*:*:*:*:*:*", "matchCriteriaId": "28DC8889-4E65-46D0-AA68-6390757862D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre24:*:*:*:*:*:*:*", "matchCriteriaId": "4E4C7373-82F1-49E6-90D6-7A02AC52F255", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre25:*:*:*:*:*:*:*", "matchCriteriaId": "7F3D847A-D8F1-40CE-AE33-A397654C55B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre26:*:*:*:*:*:*:*", "matchCriteriaId": "8B3A2CE6-F8DE-4B8A-BEEA-6732E4342792", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.2_pre27:*:*:*:*:*:*:*", "matchCriteriaId": "D9238A5E-28EA-405A-8CF9-7410CB2CA6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "7301BA35-2522-4144-83C2-6A3A6D329A8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "37993416-D81F-4F6B-AB2C-16F351BE68D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "295C826F-CBEB-4BA2-A760-22D58D231BBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "D230B213-4A35-488F-A4B5-87F77BD65E5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "AFF88062-8726-4C1D-8F93-ABA0B1654656", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "1A710565-6960-4D46-A1EB-86FE0927A66D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "81F6C954-7C0A-41E5-9719-26082E40C5E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "43784D06-2D2A-46D1-ADE2-B947B3F10F33", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "196BF37C-CD62-4D4C-A716-827B0E6A5065", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "20076B65-48E6-4DA2-BDA1-AC4F904B449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "48A2CCAD-397B-4037-B99B-F0A622FAF8D5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "50E74056-DD32-49E6-808A-5A9B755F1DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "6E2103A8-0F3F-4226-A5D8-4BF239FD6636", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "FDA35257-80F6-4DDF-94EF-ABE1ED039ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "0490AB18-A839-400D-88E2-D918B1EEFA00", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "DBED980F-A8B9-4C44-957C-FD18867B1799", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "3E033E0C-C7F6-4910-A795-28BA60E9431A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5AAAACA5-F431-4D83-B04D-EC9A81C96184", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5B46C-E7D3-495F-861C-12324F09EC9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "639E3063-34CC-4AE2-B055-92D36ECAADF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "C5305AF8-E26C-44A1-B546-AAC5D1C2D053", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "48DCAB29-4EF2-4A50-A941-DA5D89E27D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.0.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "33928D26-39DF-4E15-9979-F9484913C219", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A8F70D6-4B9C-4131-A419-4AD9325DFFC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "48B8A291-E1F7-444F-8C5B-C3C38541B3D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "24581D9F-02AF-42E6-A3D7-9CAD43E26477", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "3B978E3E-69D7-46BD-BD88-1409A546FF66", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E7FED829-128A-4F87-9838-AD0C9C11E458", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "3A39B543-5978-46FC-AF85-D635D87E3B92", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "4CE0BE0D-F509-4A91-BDD7-A0A8324498D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "803498D9-C750-4D16-8ADF-2F98E71888A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "65F6A78C-76E9-4A5F-92BD-B16D1CBE934F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "C04309D4-FEA8-47EA-BB9A-8CBD341B475F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8607F3C9-F185-4B87-8A1B-B9495A4F244D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "525A0E09-D4CF-42AA-8EB2-47E0E6CBA179", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "667201BB-5FDA-4E51-B865-0AF8507DBCDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "C1BA7280-1DF3-4A98-AFD2-C67406A32EA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "D70542A1-34B3-4EBF-BAA7-6B009CCFD22C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6F2DADBB-D90B-4B9D-B9DA-65AC39C61043", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB01B6B6-66C3-443B-BA3D-0DB17BDCC0BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6AE716BE-10CE-49EB-9CC4-068584CD3357", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5662F3D8-754D-43E3-8EE0-3DF4B0180E4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "66F38E56-8AA3-435C-AF5D-9653BEBB3B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8F0F837E-12E5-4332-9823-8B1F764042E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD35814F-3097-4298-93FA-50FDA32F6E4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1BF80379-BD68-4E3B-A7CC-57B51619A0B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "828F531E-5AB6-452C-8CC6-8A15876A14C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "57DAA48C-4B3B-4665-87AB-38ACFD6C757C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7288D12E-6C96-4019-AF7B-FA4E8AD9E041", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "37CF2822-88B6-41F2-B10A-A8B09B27245D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "0D1E264D-B441-4352-952C-EAD9228B3C81", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "B300C56E-7DF5-4B24-84D1-A4732515325E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "3313FEB0-8192-4EFE-AE3F-F3DB065E0D06", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "13846571-C84A-43D6-9970-444E6B4DB0C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "95FA5BD5-B9C6-42DD-8DE9-F2F813CD2150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "35EB5E0E-EAF1-41C1-808D-BD1ABDE8110D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "90C7C8A8-6FA5-4A75-9A68-D9C96B6552E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "B4D881C4-0302-44E9-A3C5-A23EFD681B5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "55A10A86-8077-43B6-BCEA-86F5EC10B541", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A8219F1A-D6F5-4D6E-B10D-4C455073520C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A236582-6E33-4C9B-AD16-56DDB275FE13", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "FFB37BCB-63F0-4CC7-B98D-7048D3E18BEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "FB701014-7980-4BBE-8BD9-3FD2A0AF6941", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "D68C31D4-9478-4EB6-B160-E9970ADA785D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "872F7B10-30EA-4945-99BC-9EC1C09D6D6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "5BBC3EFD-7F03-4DC1-988C-22007216F9F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "2F7898C5-9450-41FD-B45D-7504D97B4CA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "B3A247E8-F22B-4639-96D2-9BC01C904D56", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "B1233504-041A-454E-9F2E-6E2A4207879D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "EC39C113-6A7B-4152-8EBA-87A2B64D0F2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "342D2B8A-A832-4CAB-9389-93764B0DE241", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "7D44F099-7BC3-45C4-9DB3-03A7E40BC548", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "1A79A0CD-7B81-417E-8DE3-0D61006003FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "4F0A70AA-931A-4906-B4AD-D56E90683716", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "3BD4450F-6E15-40CD-94CA-63F70A3EC354", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "BB51EE46-D720-4C1F-8992-67F4422E43CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.1:alpha-cvs:*:*:*:*:*:*", "matchCriteriaId": "BDB76D9D-98AA-4C0E-A001-D2DF796BB78A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A74A3860-1FE5-4A03-9C99-2646F1AF84A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "4340AB16-25B5-4371-B490-6F2563268358", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA145B1E-674C-4C79-93C0-BC24EC5F8CDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8B5C4-C680-4DE2-9245-0A8F380C15E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "9B671031-08A4-4B9D-B3DA-7D074D8BFAC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1A2098AF-763E-4F62-BBD9-A4C9AC411C3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F3C6BA8-9ED9-42F8-9054-F94840E653E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.8:beta:*:*:*:*:*:*", "matchCriteriaId": "27D917E6-7E71-4B14-8881-C22755C6899B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "F22F7D60-BBAE-4951-B84C-C70BEB88B6F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "72B2E210-F46F-4A86-A923-82599D0CFF8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "2C0372D0-8181-4812-9741-70DC4C0AEA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "62E983BF-8D3F-4B20-A89A-BC324C5AD150", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "EF4EC417-80F8-4B04-9176-3B9199662D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "EFC7477A-5DDA-42A6-828E-A818CCF208B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "963FD695-512A-45A8-A60D-887D93FBBD1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3A38CD7-4201-4E41-8C11-51A4DEEDDB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "65ABF89E-4814-44D3-A1AD-3B7A4F876A5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "96F69A35-225C-41FF-A32B-AE53096516EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "2B218F1A-C04D-40B3-A6BE-86DA04E47D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "B6D575EF-37BA-4E69-BDD2-B99680D2CEC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.1.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "E600CF30-7D23-4F41-BCB7-26631B33A1F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "AE5CEE9D-FE82-4E87-AEA0-9A2D8186E522", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "0F3729DD-BFCC-4293-9DE7-B02588753F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5D08533D-A187-4C0E-AD4C-41061FB42413", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "7EADACB1-31D9-4297-A1C3-7F281A0AF154", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "D560434E-2636-4C7B-AC6B-A5952123B8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "AD3334C5-92F3-403D-9116-4559D18F677F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "7B173DF1-D506-47F4-8F13-18026BF7A974", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "4462DB3B-BF33-4BFA-A9C9-CF674A18D24E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E666EDB-F72C-4B14-8FF4-95B082BB38EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "96BCAA3F-EF7F-457B-8468-A736527A4F5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "4D706AEC-0814-4706-BA4C-6FED01AA4D60", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "53FCE242-9B64-4D71-BBB3-8085F7FBA8F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "A9FD6A26-7219-4958-B959-C6365193F839", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "F6307EF6-1449-43B2-A3B8-DF0EA3A6985F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "78C0FF05-0E18-4C48-BE3E-FBC881F468D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "B0C32845-BAB4-422A-B1BA-568793B4E935", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "0159DCD6-3C52-4B4C-82EC-4E699366E917", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "9E245295-3EF6-4E6D-8D44-D45B8A198E61", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "38DA0AF4-C053-4EEC-AA37-5089C9E6C778", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "7C8EE453-2FAC-4927-AC89-C92B2A947E75", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.21:alpha:*:*:*:*:*:*", "matchCriteriaId": "7AE434E6-63E1-44B0-AA79-BBDABC040234", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.22:alpha:*:*:*:*:*:*", "matchCriteriaId": "7BC742E5-CA75-43E4-BCD5-54B712CF205E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.23:alpha:*:*:*:*:*:*", "matchCriteriaId": "DADA7B77-7DBE-4A62-BE4A-83975D4D7311", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.24:alpha:*:*:*:*:*:*", "matchCriteriaId": "30D57B03-30FE-48E8-B6BA-77538F067D6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.25:alpha:*:*:*:*:*:*", "matchCriteriaId": "A0E6BD04-775B-4EDE-BF3E-2896BB59F895", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.26:alpha:*:*:*:*:*:*", "matchCriteriaId": "7900A51A-4E1E-412C-945E-DAB21078BD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.27:alpha:*:*:*:*:*:*", "matchCriteriaId": "2B68CEAF-2287-4C1B-A147-DD718E7C6418", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.28:alpha:*:*:*:*:*:*", "matchCriteriaId": "BD3CE396-518B-465F-AB91-6572601F0C89", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:*:*:*:*:*:*:*", "matchCriteriaId": "D3CAF65C-7E8F-4732-A8E3-A91724D4402A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.29:alpha:*:*:*:*:*:*", "matchCriteriaId": "B70887CA-5A54-410D-B9B4-84EE31899FBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "E6319103-D39F-4D5E-B412-9A5E29BE06F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.30:alpha:*:*:*:*:*:*", "matchCriteriaId": "C538F301-D9A9-48CC-AB77-AD073935D1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:*:*:*:*:*:*:*", "matchCriteriaId": "2F0B9C22-4B6F-465D-947F-A787A0588F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.31:alpha:*:*:*:*:*:*", "matchCriteriaId": "CFC42FE4-48BE-4EF2-900F-401CF34F113E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.32:alpha:*:*:*:*:*:*", "matchCriteriaId": "95E17189-F12A-4914-AEDC-52345D097A9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "6B11AC29-B21C-424F-8EFF-56C40F38CB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.34:alpha:*:*:*:*:*:*", "matchCriteriaId": "87591A51-BD84-459F-8BEB-6D32B392CF9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.0.35:*:*:*:*:*:*:*", "matchCriteriaId": "CB79C700-2513-4EEB-835B-454F8728DCA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "56C8611D-02BA-486D-B53D-C357A59FB520", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "41C5A8F7-47C1-4113-99C1-6E3873423D2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "1B395B51-2228-450F-B5EE-01C36BA65175", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "95189D99-0E4D-4D2D-9CDA-8C4D134D658A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "58F8E9FA-2114-42BB-925E-30253DAB8512", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "1F7A274C-1263-49F0-87B1-DB945058AD2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "025C0F19-3C30-4C6D-9587-D56BA3CAC56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "64AA728A-D5DA-4D35-A9B3-507334BCBAC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "588747DD-1CF8-44FB-8901-525BE0CFB910", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "5EB50C84-B708-468B-B9AF-FF3538BCE53D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "9414DDD6-FD18-4E5B-BB3F-6FBF831D4A74", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8B12C5C-EF6A-47DB-948B-6C455C75AD4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "9D7E8B65-B0A0-4651-A40F-029D1F3D3601", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "55208554-8B4A-412F-8346-B1DEBB9196FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "01C09EB4-AEF4-4360-997A-5B8A5D85CEBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "D8E0C717-1931-48BB-A074-6607B5DBA194", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "16A0A823-94D9-4BDB-9695-7B1996B0E976", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "C54A1BE3-CA35-4305-9B58-7AD8F6704743", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "5748EA55-73D4-475F-93AE-ED8081FB196E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "F29F6112-DAA0-4E63-98D3-AC3D78475EA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "609CF2C7-01B9-4635-B488-271562774598", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "FE848E03-E579-424A-9438-20C9D9D554D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "09D72E60-A110-42E8-9F9F-38B5D2108F79", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "00616D43-0637-4F0C-9213-33D9E8E9A376", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "266BBF1D-283F-4169-A943-4224F87DC95E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "C9BA0B4D-3AE7-4BE0-89EB-378F74C6F170", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "6BD0BDD6-409D-4443-AAA3-FCCD2B896E69", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "38648AEF-6232-4A78-B306-4509FF9D431E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "155BFC2E-F388-4AD7-A5BC-3531FC81948F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.1:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF240A26-E071-4C64-B0E7-6E5F7D9BD964", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C1908AB-04C3-4F96-B681-9B661C122063", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "EF856938-A172-4BA9-86BF-7C7F3F8E382C", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "B0FFFC75-CECB-4609-B5C2-153192FE9399", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.3:alpha:*:*:*:*:*:*", "matchCriteriaId": "5ECBB2B5-5F2A-4A89-9A72-DB47B5331AB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "D8B64406-ECC9-445A-9550-E1B8124BF85E", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.4:alpha:*:*:*:*:*:*", "matchCriteriaId": "F7A37134-5162-4E48-BE5C-93807F4CD055", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C7F42FD-A98D-40F9-AE5D-CA5DE2FB575B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.5:alpha:*:*:*:*:*:*", "matchCriteriaId": "4CECAD72-6E99-400D-82A8-3792E88C65F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "47FD7FC5-30C3-48D7-8A95-7F923EA25457", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.6:alpha:*:*:*:*:*:*", "matchCriteriaId": "38665A22-85F6-4F7E-A73B-CBB82828F63D", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.7:alpha:*:*:*:*:*:*", "matchCriteriaId": "D53B7BB7-CD6F-4CD9-AF00-5FE3C128CCAB", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.8:alpha:*:*:*:*:*:*", "matchCriteriaId": "381A931A-7DAD-4F38-8723-692B59130967", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.9:alpha:*:*:*:*:*:*", "matchCriteriaId": "F1A7277C-E314-4460-8460-282BB57BC2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.10:alpha:*:*:*:*:*:*", "matchCriteriaId": "C279687E-9E83-43A7-8C14-8074749C779A", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.11:alpha:*:*:*:*:*:*", "matchCriteriaId": "6427F81C-C4C6-42B0-BFF0-280DB8F5397B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.12:alpha:*:*:*:*:*:*", "matchCriteriaId": "8BC6362D-423D-4E6E-8690-F3BEABC7C18B", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.13:alpha:*:*:*:*:*:*", "matchCriteriaId": "DC1AFB78-CB53-4681-994A-3932F1A7322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.14:alpha:*:*:*:*:*:*", "matchCriteriaId": "4AD51B4D-8222-4006-83D0-CFB48971E6EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.15:alpha:*:*:*:*:*:*", "matchCriteriaId": "B9A498E1-03A2-45C6-8DB4-EA4EE5DBD8A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.16:alpha:*:*:*:*:*:*", "matchCriteriaId": "633CD28C-AE47-4B2F-8AA6-F9CBA6BA9B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.17:alpha:*:*:*:*:*:*", "matchCriteriaId": "4959EA8E-D957-4B19-9F80-637E1423980F", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.18:alpha:*:*:*:*:*:*", "matchCriteriaId": "39AB49B0-53A0-416B-8924-ACAF94580B63", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.19:alpha:*:*:*:*:*:*", "matchCriteriaId": "5E4BEC5B-313B-4292-86F4-66BAAB5E0987", "vulnerable": true }, { "criteria": "cpe:2.3:a:tor:tor:0.2.2.20:alpha:*:*:*:*:*:*", "matchCriteriaId": "F0486F7F-F095-4911-8F2F-E8BDABA835EB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process." }, { "lang": "es", "value": "Tor en versiones anteriores a la 0.2.1.29 y 0.2.2.x anteriores a la 0.2.2.21-alpha no gestiona apropiadamente datos de clave en memoria, lo que puede permitir a usuarios locales obtener informaci\u00f3n confidencial a trav\u00e9s de la lectura de memoria que ha sido utilizada previamente por un proceso diferente." } ], "id": "CVE-2011-0016", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-19T12:00:19.640", "references": [ { "source": "secalert@redhat.com", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42905" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42907" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2011/dsa-2148" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2011/01/18/7" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/45832" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1024980" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "source": "secalert@redhat.com", "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "secalert@redhat.com", "url": "https://trac.torproject.org/projects/tor/ticket/2384" }, { "source": "secalert@redhat.com", "url": "https://trac.torproject.org/projects/tor/ticket/2385" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.seul.org/or/announce/Jan-2011/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://blog.torproject.org/blog/tor-02129-released-security-patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42907" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2011/01/18/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/45832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1024980" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://gitweb.torproject.org/tor.git/blob/refs/heads/release-0.2.2:/ChangeLog" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://trac.torproject.org/projects/tor/ticket/2384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://trac.torproject.org/projects/tor/ticket/2385" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }