Vulnerabilities > Torproject > TOR > 0.3.5.14
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-01-14 | CVE-2023-23589 | The SafeSocks option in Tor before 0.4.7.13 has a logic error in which the unsafe SOCKS4 protocol can be used but not the safe SOCKS4a protocol, aka TROVE-2022-002. | 6.5 |
2021-08-30 | CVE-2021-38385 | Reachable Assertion vulnerability in Torproject TOR Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007. | 7.5 |
2021-06-29 | CVE-2021-34549 | Resource Exhaustion vulnerability in Torproject TOR An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. | 7.5 |
2021-06-29 | CVE-2021-34550 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Torproject TOR An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. | 7.5 |
2021-06-29 | CVE-2021-34548 | Authentication Bypass by Spoofing vulnerability in Torproject TOR An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. | 7.5 |
2020-02-02 | CVE-2020-8516 | Unspecified vulnerability in Torproject TOR The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. | 5.3 |
2017-11-04 | CVE-2017-16541 | Information Exposure vulnerability in multiple products Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. | 6.5 |