Torproject
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Torproject product.
RSS Feeds for Torproject security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Torproject products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Torproject Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2025 there have been 1 vulnerability in Torproject with an average score of 3.7 out of ten. Torproject did not have any published security vulnerabilities last year. That is, 1 more vulnerability have already been reported in 2025 as compared to last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2025 | 1 | 3.70 |
| 2024 | 0 | 0.00 |
| 2023 | 1 | 6.50 |
| 2022 | 1 | 7.50 |
| 2021 | 6 | 7.13 |
| 2020 | 4 | 6.95 |
| 2019 | 3 | 5.70 |
| 2018 | 3 | 8.27 |
It may take a day or so for new Torproject vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Torproject Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2025-4444 | Sep 18, 2025 |
Tor v0.4.8.17 Onion Service Descriptor Handler Resource ExhaustionA security flaw has been discovered in Tor up to 0.4.7.16/0.4.8.17. Impacted is an unknown function of the component Onion Service Descriptor Handler. Performing manipulation results in resource consumption. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitability is considered difficult. Upgrading to version 0.4.8.18 and 0.4.9.3-alpha is recommended to address this issue. It is recommended to upgrade the affected component. |
|
| CVE-2023-23589 | Jan 14, 2023 |
The SafeSocks option in Tor before 0.4.7.13 has a logic error inThe SafeSocks option in Tor before 0.4.7.13 has a logic error in which the unsafe SOCKS4 protocol can be used but not the safe SOCKS4a protocol, aka TROVE-2022-002. |
|
| CVE-2022-33903 | Jul 17, 2022 |
Tor 0.4.7.x before 0.4.7.8Tor 0.4.7.x before 0.4.7.8 allows a denial of service via the wedging of RTT estimation. |
|
| CVE-2021-38385 | Aug 30, 2021 |
Tor before 0.3.5.16Tor before 0.3.5.16, 0.4.5.10, and 0.4.6.7 mishandles the relationship between batch-signature verification and single-signature verification, leading to a remote assertion failure, aka TROVE-2021-007. |
|
| CVE-2021-34549 | Jun 29, 2021 |
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data. Consequently. an attacker can trigger the use of an attacker-chosen circuit ID to cause algorithm inefficiency. |
|
| CVE-2021-34550 | Jun 29, 2021 |
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory access, and a client crash, via a crafted onion service descriptor |
|
| CVE-2021-34548 | Jun 29, 2021 |
An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-003. An attacker can forge RELAY_END or RELAY_RESOLVED to bypass the intended access control for ending a stream. |
|
| CVE-2021-28090 | Mar 19, 2021 |
Tor before 0.4.5.7 allows a remote attacker to cause Tor directory authorities to exit with an assertion failureTor before 0.4.5.7 allows a remote attacker to cause Tor directory authorities to exit with an assertion failure, aka TROVE-2021-002. |
|
| CVE-2021-28089 | Mar 19, 2021 |
Tor before 0.4.5.7 allows a remote participant in the Tor directory protocol to exhaust CPU resources on a targetTor before 0.4.5.7 allows a remote participant in the Tor directory protocol to exhaust CPU resources on a target, aka TROVE-2021-001. |
|
| CVE-2020-15572 | Jul 15, 2020 |
Tor before 0.4.3.6 has an out-of-bounds memory accessTor before 0.4.3.6 has an out-of-bounds memory access that allows a remote denial-of-service (crash) attack against Tor instances built to use Mozilla Network Security Services (NSS), aka TROVE-2020-001. |
|