Max CVSS | 6.8 | Min CVSS | 2.1 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2011-0492 | 5.0 |
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (assertion failure and daemon exit) via blobs that trigger a certain file size, as demonstrated by the cached-descriptors.new file.
|
17-08-2017 - 01:33 | 19-01-2011 - 12:00 | |
CVE-2011-0491 | 5.0 |
The tor_realloc function in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not validate a certain size value during memory allocation, which might allow remote attackers to cause a denial of service (daemon crash) via unspecified vectors,
|
17-08-2017 - 01:33 | 19-01-2011 - 12:00 | |
CVE-2011-0493 | 5.0 |
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha might allow remote attackers to cause a denial of service (assertion failure and daemon exit) via vectors related to malformed router caches and improper handling of integer values.
|
17-08-2017 - 01:33 | 19-01-2011 - 12:00 | |
CVE-2011-0490 | 5.0 |
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha makes calls to Libevent within Libevent log handlers, which might allow remote attackers to cause a denial of service (daemon crash) via vectors that trigger certain log messages.
|
17-08-2017 - 01:33 | 19-01-2011 - 12:00 | |
CVE-2011-0427 | 6.8 |
Heap-based buffer overflow in Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
|
17-08-2017 - 01:33 | 19-01-2011 - 12:00 | |
CVE-2011-0015 | 5.0 |
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly check the amount of compression in zlib-compressed data, which allows remote attackers to cause a denial of service via a large compression factor.
|
19-07-2011 - 04:00 | 19-01-2011 - 12:00 | |
CVE-2011-0016 | 2.1 |
Tor before 0.2.1.29 and 0.2.2.x before 0.2.2.21-alpha does not properly manage key data in memory, which might allow local users to obtain sensitive information by leveraging the ability to read memory that was previously used by a different process.
|
22-01-2011 - 05:00 | 19-01-2011 - 12:00 |