Monday, February 10, 2025
HomeSecurity ToolsTor Browser 10.0.18 Released - Fixed The Flaw That Let Websites...

Tor Browser 10.0.18 Released – Fixed The Flaw That Let Websites Tracking Users

Published on

SIEM as a Service

Follow Us on Google News

Tor is one of the biggest open-source software, its networks have virtual tunnels that generally enable people and different groups to enhance their privacy and security on the Internet.

Recently Tor has released its Tor Browser 10.0.18, and the main motive of this release is to fix all the countless bugs, which also include a vulnerability that enables different websites to keep track of their users by fingerprinting the installed application.

We all know that Tor administers Internet traffic with the help of an overlay network that is free worldwide.

But, this network consists of nearly seven thousand relays, that help in concealing a user’s location as well as usage from people who are conducting network surveillance or traffic examination.

Scheme Flooding vulnerability

Scheme flooding is a vulnerability, that uses different custom URL schemes as an attack vector. According to the experts, this vulnerability generally enables the actors to identify that which applications have been installed by the users.

Once the experts identified the application successfully, then they use all the data and information of the installed app on the user’s computer. 

And the main motive of doing this is that they want to assign a permanent unique identifier in the user’s computer so that they can use the system even if the users switch browsers just by using incognito mode or a VPN.

Not only this but scheme flooding also allows third-party tracking in a different browser. However, this exploit generally helps the hackers to track down the usage of users’ browsers like Google Chrome, Safari, even the Tor browser as well.

Thorough Changelog

The experts have mentioned a full changelog for Tor 10.0.18, which is given below:-

All Platforms

  • Update Tor to 0.4.5.9

Android

  • Update Fenix to 89.1.1
  • Update NoScript to 11.2.8
  • Bug 40055: Rebase android-components patches on 75.0.22 for Fenix 89
  • Bug 40165: Announce v2 onion service deprecation on about:tor
  • Bug 40166: Hide “Normal” tab (again) and Sync tab in TabTray
  • Bug 40167: Hide “Save to Collection” in menu
  • Bug 40169: Rebase fenix patches to fenix v89.1.1
  • Bug 40170: Error building tor-browser-89.1.1-10.5-1
  • Bug 40432: Prevent probing installed applications
  • Bug 40470: Rebase 10.0 patches onto 89.0

Build System

  • Android
    • Bug 40290: Update components for mozilla89-based Fenix

According to the security researchers, as well as Tor, this new version updates Tor to 0.4.5.9, and it consists of all the important security fixes. 

While this new release also updates Firefox to 89.1.1, and NoScript to 11.2.8 and all this new version includes the important security updates to Firefox for Android.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Linux Kernel 6.14-rc2 Released – What’s Newly Added !

Linus Torvalds, lead developer of the Linux kernel, announced the second release candidate (rc2)...

Critical Zimbra Flaws Allow Attackers to Gain Unauthorized Access to Sensitive Data

Serious vulnerabilities in Zimbra Collaboration Suite (ZCS), a popular enterprise email and collaboration platform,...

Tor Browser 14.0.6 Released, What’s New!

The Tor Project has officially unveiled Tor Browser 14.0.6, now accessible for download from the...

Hackers Exploit AnyDesk Vulnerability to Gain Admin Access – PoC Released

A newly discovered vulnerability in AnyDesk, the popular remote desktop software, has sparked serious...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ghidra 11.3 Released – A Major Update to NSA’s Open-Source Tool

The National Security Agency (NSA) has officially released Ghidra 11.3, the latest iteration of...

Android Security Update Fixes Linux Kernel RCE Flaw Allow Read/Write Access

On February 3, 2025, Google published its February Android Security Bulletin, which addresses a...

Beware of SmartApeSG Campaigns that Deliver NetSupport RAT

SmartApeSG, a FakeUpdate cyber threat, has emerged as a significant vector for delivering NetSupport...