Back to VulnFeed / CVE-2026-44602
root@hackertop:~/vulnfeed/CVE-2026-44602#
CVE-2026-44602 LOW CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

Tor up to 0.4.9.7 null pointer dereference

Tor 14d ago Impact pending confirmation
LIFECYCLE
3.7 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in Tor up to 0.4.9.7 (Network Encryption Software). It has been declared as problematic. Affected by this vulnerability is an unknown code block. Upgrading to version 0.4.9.7 eliminates this vulnerability. Applying the patch df7d5174ef41814d806c8ede776e230cd30ac12b is able to eliminate this problem. The bugfix is ready for download at gitlab.torproject.org. The best possible mitigation is suggested to be upgrading to the latest version.
Root Cause Analysis
The CWE definition for the vulnerability is CWE-476. A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Impact: As an impact it is known to affect availability.

Countermeasure: Upgrading to version 0.4.9.7 eliminates this vulnerability. Applying the patch df7d5174ef41814d806c8ede776e230cd30ac12b is able to eliminate this problem. The bugfix is ready for download at gitlab.torproject.org. The best possible mitigation is suggested to be upgrading to the latest version.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-44602 · CVSS 3.7 · Active Threat