296,172
Total vulnerabilities in the database
Tor before 0.1.2.15 can select a guard node beyond the first listed never-before-connected-to guard node, which allows remote attackers with control of certain guard nodes to obtain sensitive information and possibly leverage further attacks.
Software | From | Fixed in |
---|---|---|
tor / tor | 0.1.1.1_alpha | 0.1.1.1_alpha.x |
tor / tor | 0.1.2.1_alpha-cvs | 0.1.2.1_alpha-cvs.x |
tor / tor | 0.1.0.18 | 0.1.0.18.x |
tor / tor | 0.1.1.23 | 0.1.1.23.x |
tor / tor | 0.1.0.10 | 0.1.0.10.x |
tor / tor | 0.1.0.12 | 0.1.0.12.x |
tor / tor | 0.1.1.3_alpha | 0.1.1.3_alpha.x |
tor / tor | 0.1.2.14 | 0.1.2.14.x |
tor / tor | 0.1.0.13 | 0.1.0.13.x |
tor / tor | 0.1.0.14 | 0.1.0.14.x |
tor / tor | 0.1.1.4_alpha | 0.1.1.4_alpha.x |
tor / tor | 0.1.1.2_alpha | 0.1.1.2_alpha.x |
tor / tor | 0.1.1.20 | 0.1.1.20.x |
tor / tor | 0.1.1.5_alpha | 0.1.1.5_alpha.x |
tor / tor | 0.1.0.11 | 0.1.0.11.x |