Download
| Alert*
oval:org.secpod.oval:def:605567
Multiple security vulnerabilities were discovered in Tor, a connection-based low-latency anonymous communication system, which could result in denial of service or spoofing. oval:org.secpod.oval:def:120393 The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tors users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals ... oval:org.secpod.oval:def:120394 The Tor network is a group of volunteer-operated servers that allows people to improve their privacy and security on the Internet. Tors users employ this network by connecting through a series of virtual tunnels rather than making a direct connection, thus allowing both organizations and individuals ... oval:org.secpod.oval:def:73661 Multiple security vulnerabilities were discovered in Tor, a connection-based low-latency anonymous communication system, which could result in denial of service or spoofing. |