Loading...
Loading...
TorK before 0.22, when running on Windows and Mac OS X, installs Privoxy with a configuration file (config.txt or config) that contains insecure (1) enable-remote-toggle and (2) enable-edit-actions settings, which allows remote attackers to bypass intended access restrictions and modify configuration.
March 31, 2009
April 23, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2007-6723
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.