First published: Thu Aug 13 2015(Updated: )
BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BitTorrent | ||
BitTorrent |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.