Tor - HackerOne Reports
View on HackerOne51
Total Reports
2
Critical
9
High
5
Medium
11
Low
[Android org.torproject.android] Possible to force list of bridges
Reported by:
bagipro
|
Disclosed:
High
Weakness: Forced Browsing
Scrollbar Width permits detecting browser platform
Reported by:
hackerfactor
|
Disclosed:
Low
Weakness: Information Disclosure
16 instances where return value of OpenSSL i2d_RSAPublicKey is discarded -- might lead to use of uninitialized memory
Reported by:
guido
|
Disclosed:
Weakness: Information Disclosure
solving TOR vulnerability, in other to make bruteforce difficult
Reported by:
joelisto
|
Disclosed:
Low
Weakness: Array Index Underflow
CVEs:
CVE-2007-6750
[tor] control connection pre-auth DoS (infinite loop) with --enable-bufferevents
Reported by:
guido
|
Disclosed:
Weakness: Uncontrolled Resource Consumption
Report Regarding Security Vulnerability
Reported by:
srkfan
|
Disclosed:
Tor Project - Full Path Disclosure
Reported by:
yox
|
Disclosed:
Low
Weakness: Information Exposure Through an Error Message
SQL Injection in parameter REPORT
Reported by:
wiloos
|
Disclosed:
Medium
Weakness: SQL Injection
Tor Browser: iframe with `data:` uri has access to parent window
Reported by:
metnew
|
Disclosed:
High
Snowflake server: Leak of TLS packets from other clients
Reported by:
hazae41
|
Disclosed:
High
Weakness: Information Disclosure
Address Bar Spoofing on TOR Browser
Reported by:
soulhunter
|
Disclosed:
High
Weakness: Phishing
Simple CSS line-height identifies platform
Reported by:
hackerfactor
|
Disclosed:
Low
Weakness: Information Disclosure
Potential IP revealing using UNC Path in Windows File Picker
Reported by:
newfunction
|
Disclosed:
Low
Weakness: Information Disclosure
languagechange event fires simultaneously on all tabs
Reported by:
tomvg
|
Disclosed:
Low
Weakness: Privacy Violation
Bounty: $100.00
Crashes/Buffer at 0x2C0086,name=PBrowser::Msg_Destroy
Reported by:
dhiraj-mishra
|
Disclosed:
Medium
Weakness: Classic Buffer Overflow
Preferred language option fingerprinting issue in Tor Browser
Reported by:
newfunction
|
Disclosed:
Low
Weakness: Information Disclosure
Use of uninitialized value in networkstatus_parse_vote_from_string (src/or/routerparse.c:3533)
Reported by:
geeknik
|
Disclosed:
Weakness: Memory Corruption - Generic
Use of unitialized value in token_check_object (src/or/parsecommon.c:224)
Reported by:
geeknik
|
Disclosed:
Weakness: Memory Corruption - Generic
libevent (stack) buffer overflow in evutil_parse_sockaddr_port
Reported by:
guido
|
Disclosed:
Weakness: Memory Corruption - Generic
smartlist_add, smartlist_insert (may) cause heap corruption as a result of inadequate checks in smartlist_ensure_capacity
Reported by:
guido
|
Disclosed:
Weakness: Memory Corruption - Generic