Product Detail
TOR
Public Exploit/PoC Code :
2
CISA Actively Exploited :
0
Last Vulnerability Seen :
Aug. 26, 2012
Vulnerabilities
The following vulnerabilities are recorded
TOR
product. You can click on the
vulnerability to view more details.
Number | Published | CVE ID | Severity | CVSS Score | |
---|---|---|---|---|---|
1 | Aug 31, 2006 | CVE-2006-4508 | MEDIUM |
4.0
|
|
2 | Jul 07, 2006 | CVE-2006-3417 | MEDIUM |
6.4
|
|
3 | Jul 07, 2006 | CVE-2006-3416 | MEDIUM |
5.0
|
|
4 | Jul 07, 2006 | CVE-2006-3413 | MEDIUM |
5.0
|
|
5 | Jul 07, 2006 | CVE-2006-3412 | MEDIUM |
6.4
|
|
6 | Jul 07, 2006 | CVE-2006-3411 | MEDIUM |
6.4
|
|
7 | Jul 07, 2006 | CVE-2006-3410 | MEDIUM |
5.0
|
|
8 | Jul 07, 2006 | CVE-2006-3409 | HIGH |
7.5
|
|
9 | Jul 07, 2006 | CVE-2006-3408 | MEDIUM |
5.0
|
|
10 | Jul 07, 2006 | CVE-2006-3407 | MEDIUM |
6.4
|
|
11 | Jul 07, 2006 | CVE-2006-3415 | MEDIUM |
6.4
|
|
12 | Jul 07, 2006 | CVE-2006-3414 | MEDIUM |
5.0
|
|
13 | Jul 07, 2006 | CVE-2006-3419 | MEDIUM |
5.0
|
|
14 | Jul 07, 2006 | CVE-2006-3418 | MEDIUM |
5.0
|
|
15 | Jan 25, 2006 | CVE-2006-0414 | MEDIUM |
5.0
|
|
16 | Aug 23, 2005 | CVE-2005-2643 | MEDIUM |
5.0
|
|
17 | Jun 28, 2005 | CVE-2005-2050 | MEDIUM |
5.0
|