tor vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://archive.torproject.org|tor package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Insecure Defaults

[0.3.5.1-alpha,0.4.5.16)[0.4.6.1-alpha,0.4.7.13)
  • H
Denial of Service (DoS)

[0.4.7.0,0.4.7.8)
  • M
Improper Input Validation

[,0.2.2.39)
  • M
Access Restriction Bypass

[,0.1.2.16)
  • H
Memory Leak

[0.3.5,0.3.5.10)(0.4.1.0,0.4.1.9)(0.4.2.0,0.4.2.8)
  • M
Access Restriction Bypass

[,0.2.2.34)
  • H
NULL Pointer Dereference

[,0.3.0.1)[0.3.1.7,0.3.2.1)
  • M
Information Exposure

[,0.2.1.22)[0.2.2.0,0.2.2.7)
  • M
Denial of Service (DoS)

[,0.2.0.34)
  • M
Insertion of Sensitive Information into Log File

[,0.2.9.1)
  • H
Improper Input Validation

[,0.2.4.26)[0.2.5.1,0.2.5.11)
  • H
Improper Input Validation

[,0.3.0.8)
  • M
Denial of Service (DoS)

[,0.3.5.14)[0.4.4.4,0.4.4.8)[0.4.5.0,0.4.5.7)
  • M
CVE-2006-3410

[,0.1.1.20)
  • M
CVE-2006-3411

[,0.1.1.20)
  • M
Information Exposure

[,0.2.2.34)
  • M
Information Exposure

[,0.2.1.22)[0.2.2.0,0.2.2.7)
  • M
Open Redirect

[,0.1.2.8)[0.2.0.0,0.2.0.35)
  • H
Out-of-Bounds

[,0.2.8.12)
  • M
Denial of Service (DoS)

[,0.2.1.29)
  • H
Improper Input Validation

[,0.3.0.8)
  • M
Out-of-Bounds

[,0.2.1.30)
  • M
Denial of Service (DoS)

[,0.2.0.34)
  • M
Denial of Service (DoS)

[,0.2.2.39)
  • M
Information Exposure

[,0.2.2.25)
  • H
Access Restriction Bypass

[,0.2.0.1)
  • H
Denial of Service (DoS)

[,0.2.4.27)[0.2.5.1,0.2.5.12)[0.2.6.1,0.2.6.7)
  • H
Denial of Service (DoS)

[0.3.5,0.3.5.10)(0.4.1.0,0.4.1.9)(0.4.2.0,0.4.2.8)
  • M
Improper Input Validation

[,0.1.1.20)
  • M
Denial of Service (DoS)

[,0.2.1.29)
  • H
Improper Handling of Exceptional Conditions

[,0.2.4.26)[0.2.5.1,0.2.5.11)
  • M
CVE-2006-3419

[,0.1.1.20)
  • M
CVE-2006-0414

[,0.1.1.20)
  • M
CVE-2005-2050

[,0.1.0.10)
  • M
CVE-2006-3417

[,0.1.1.20)
  • M
Resource Management Errors

[,0.2.1.29)
  • M
Information Exposure

[,0.1.2.14)
  • M
Access Restriction Bypass

[,0.1.1.20)
  • M
CVE-2009-0654

[,0.2.0.35)
  • H
Arbitrary Code Execution

[,0.1.1.20)
  • M
Resource Management Errors

[,0.2.3.25)
  • M
Information Exposure

[,0.2.2.34)
  • M
Denial of Service (DoS)

[,0.1.2.15)
  • M
Improper Input Validation

[,0.2.1.29)
  • H
Improper Handling of Exceptional Conditions

[,0.3.5.15)[0.4.0.0,0.4.4.9)[0.4.5.0,0.4.5.9)[0.4.6.0,0.4.6.5)
  • H
Denial of Service (DoS)

[,0.3.5.16)[0.4.0.0,0.4.5.10)[0.4.6.0,0.4.6.7)
  • M
Information Exposure

[,0.2.2.7)
  • H
Denial of Service (DoS)

[,0.3.5.14)[0.4.4.4,0.4.4.8)[0.4.5.0,0.4.5.7)
  • M
Resource Management Errors

[,0.2.1.29)
  • M
CVE-2006-6893

[,0.1.1.26]
  • C
Resource Management Errors

[,0.2.0.33)
  • H
Access Restriction Bypass

[,0.2.0.1)
  • M
CVE-2014-5117

[,0.2.4.23)
  • M
Information Exposure

[,0.1.2.15)
  • M
CVE-2007-4098

[,0.1.2.15)
  • M
Information Exposure

[,0.1.1.20)
  • M
Improper Input Validation

[,0.2.1.29)
  • M
Improper Input Validation

[,0.2.0.35)
  • M
Denial of Service (DoS)

[,0.1.1.20)
  • M
Information Exposure

[,0.2.2.24)
  • H
Out-of-Bounds

[,0.3.5.15)[0.4.0.0,0.4.4.9)[0.4.5.0,0.4.5.9)[0.4.6.0,0.4.6.5)
  • M
Information Exposure

[,7.0.9)
  • M
Out-of-Bounds

[,0.2.1.29)
  • C
Out-of-Bounds

[,0.2.1.2)
  • H
Out-of-Bounds

[,0.3.5.11)(0.4.2.0,0.4.2.8)(0.4.3.0,0.4.3.6)
  • M
Cryptographic Issues

[,0.2.4.20)
  • C
CVE-2009-0939

[,0.2.0.34)
  • M
Denial of Service (DoS)

[,0.1.0.18)[0.1.1.0,0.1.1.23)[1.0.0,1.0.2)
  • M
Information Exposure

[,0.1.2.15)
  • H
Out-of-Bounds

[,0.2.2.35)
  • H
Denial of Service (DoS)

[,0.2.4.27)[0.2.5.1,0.2.5.12)[0.2.6.1,0.2.6.7)
  • H
Information Exposure

[,0.3.0.9)
  • M
CVE-2005-2643

[0.0.9,0.1.1.4_alpha]
  • M
Denial of Service (DoS)

[,0.2.3.23)
  • M
Denial of Service (DoS)

[,0.2.3.24)
  • M
Improper Input Validation

[,0.1.1.20)
  • M
Information Exposure

[,0.2.2.34)
  • H
Out-of-Bounds

[,0.2.8.9)
  • M
Arbitrary Code Execution

[,0.1.1.20)
  • M
Denial of Service (DoS)

[,0.2.0.34)
  • H
Denial of Service (DoS)

[,0.3.3.12)[0.3.4.8,0.3.4.11)
  • H
Incorrect Authorization

[,0.3.5.15)[0.4.0.0,0.4.4.9)[0.4.5.0,0.4.5.9)[0.4.6.0,0.4.6.5)
  • H
Use After Free

[0.3.2.0,0.3.2.10)
  • M
CVE-2006-3414

[,0.1.1.20)