The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    No history.
Information
                Published : 2020-02-02 13:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-8516
Mitre link : CVE-2020-8516
CVE.ORG link : CVE-2020-8516
JSON object : View
Products Affected
                torproject
- tor
 
CWE
                