tor vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the tor package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
CVE-2022-33903

<0.4.7.8-r0
  • M
CVE-2021-28090

<0.4.5.7-r0
  • H
Buffer Overflow

<0.4.6.5-r0
  • H
NULL Pointer Dereference

<0.3.2.10-r0
  • H
Reachable Assertion

<0.3.0.8-r0
  • H
Resource Exhaustion

<0.4.2.7-r0
  • H
Use After Free

<0.3.2.10-r0
  • H
Buffer Overflow

<0.4.6.5-r0
  • H
Allocation of Resources Without Limits or Throttling

<0.3.5.8-r0
  • H
Use After Free

<0.4.6.5-r0
  • H
Resource Exhaustion

<0.4.5.7-r0
  • H
Reachable Assertion

<0.4.6.7-r0
  • H
Memory Leak

<0.4.2.7-r0