Common vulnerabilities and Exposures (CVE)

Skip to main content

Required CVE Record Information

Description

Tor before 0.1.1.20 allows remote attackers to identify hidden services via a malicious Tor server that attempts a large number of accesses of the hidden service, which eventually causes a circuit to be built through the malicious server.

Updated:

This container includes required additional information provided by the CVE Program for this vulnerability.