TOR Vulnerability Impact Analysis