Back to VulnFeed / CVE-2026-44603
root@hackertop:~/vulnfeed/CVE-2026-44603#
CVE-2026-44603 LOW CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

Tor up to 0.4.9.7 off-by-one

Tor 14d ago Impact pending confirmation
LIFECYCLE
3.7 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in Tor up to 0.4.9.7 (Network Encryption Software). It has been rated as problematic. Affected by this issue is some unknown processing. Upgrading to version 0.4.9.7 eliminates this vulnerability. Applying the patch 1703df3d439c83c2184e259fad1cfa19240f9c89 is able to eliminate this problem. The bugfix is ready for download at gitlab.torproject.org. The best possible mitigation is suggested to be upgrading to the latest version.
Root Cause Analysis
Using CWE to declare the problem leads to CWE-193. A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.

Impact: Impacted is availability.

Countermeasure: Upgrading to version 0.4.9.7 eliminates this vulnerability. Applying the patch 1703df3d439c83c2184e259fad1cfa19240f9c89 is able to eliminate this problem. The bugfix is ready for download at gitlab.torproject.org. The best possible mitigation is suggested to be upgrading to the latest version.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-44603 · CVSS 3.7 · Active Threat