Loading...
Loading...
Tor does not verify a node's uptime and bandwidth advertisements, which allows remote attackers who operate a low resource node to make false claims of greater resources, which places the node into use for many circuits and compromises the anonymity of traffic sources and destinations.
February 26, 2007
April 23, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2007-1103
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.