TOR, an implementation of second generation Onion Routing, vulnerable to multiple vulnerabilities . The critical one of which may allows a remote attacker to execute arbitrary code.
A remote attacker could possibly execute arbitrary code or cause a Denial of Service by exploiting the vulnerability. Furthermore, a remote relay the user is directly connected to may be able to disclose anonymous information about that user or enumerate bridges in the user’s connection. Continue reading Multiple Vulnerabilities found in Tor, allows a remote Hacking