tor vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the tor package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

<0.3.2.10-r0
  • H
Resource Exhaustion

<0.4.5.7-r0
  • H
NULL Pointer Dereference

<0.3.2.10-r0
  • M
CVE-2021-28090

<0.4.5.7-r0
  • H
CVE-2022-33903

<0.4.7.8-r0
  • H
Buffer Overflow

<0.4.6.5-r0
  • H
Use After Free

<0.4.6.5-r0
  • H
Reachable Assertion

<0.3.0.8-r0
  • H
Memory Leak

<0.4.2.7-r0
  • H
Resource Exhaustion

<0.4.2.7-r0
  • H
Reachable Assertion

<0.4.6.7-r0
  • H
Buffer Overflow

<0.4.6.5-r0
  • H
Allocation of Resources Without Limits or Throttling

<0.3.5.8-r0