Vulnerabilities
Vulnerable Software
Anonymityanywhere:  >> Tork  Security Vulnerabilities
TorK before 0.22, when running on Windows and Mac OS X, installs Privoxy with a configuration file (config.txt or config) that contains insecure (1) enable-remote-toggle and (2) enable-edit-actions settings, which allows remote attackers to bypass intended access restrictions and modify configuration.
CVSS Score
4.3
EPSS Score
0.005
Published
2009-03-31


Contact Us

Shodan ® - All rights reserved