The Web UI interface in (1) BitTorrent before 6.0.3 build 8642 and (2) uTorrent before 1.8beta build 10524 allows remote attackers to cause a denial of service (application crash) via an HTTP request with a malformed Range header.
Max CVSS
4.3
EPSS Score
3.87%
Published
2008-06-16
Updated
2018-10-15
Buffer overflow in (1) BitTorrent 6.0 and earlier; and (2) uTorrent 1.7.5 and earlier, and 1.8-alpha-7834 and earlier in the 1.8.x series; on Windows allows remote attackers to cause a denial of service (application crash) via a long Unicode string representing a client version identifier.
Max CVSS
5.0
EPSS Score
6.20%
Published
2008-01-18
Updated
2018-10-15
Stack-based buffer overflow in (1) uTorrent 1.7.7 build 8179 and earlier and (2) BitTorrent 6.0.3 build 8642 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long Created By field in a .torrent file.
Max CVSS
9.3
EPSS Score
12.09%
Published
2008-10-03
Updated
2017-08-08
Buffer overflow in the web interface in BitTorrent 6.0.1 (build 7859) and earlier, and uTorrent 1.7.6 (build 7859) and earlier, allows remote attackers to cause a denial of service (memory consumption and crash) via a crafted Range header. NOTE: this is probably a different vulnerability than CVE-2008-0071 and CVE-2008-0364.
Max CVSS
5.0
EPSS Score
1.29%
Published
2009-09-04
Updated
2009-09-09
The lazy_bdecode function in BitTorrent bootstrap-dht (aka Bootstrap) allows remote attackers to execute arbitrary code via a crafted packet, which triggers an out-of-bounds read, related to "Improper Indexing."
Max CVSS
7.5
EPSS Score
61.81%
Published
2014-10-31
Updated
2014-11-03
The web interface in BitTorrent allows remote attackers to execute arbitrary commands by leveraging knowledge of the pairing values and a crafted request to port 10000.
Max CVSS
6.8
EPSS Score
29.52%
Published
2014-12-12
Updated
2014-12-16
BitTorrent Sync allows remote attackers to execute arbitrary commands via a crafted btsync: link.
Max CVSS
9.3
EPSS Score
54.02%
Published
2015-04-13
Updated
2016-12-03
BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol.
Max CVSS
9.3
EPSS Score
26.47%
Published
2015-08-13
Updated
2015-08-13
The lazy_bdecode function in BitTorrent DHT bootstrap server (bootstrap-dht ) allows remote attackers to execute arbitrary code via a crafted packet, related to "improper indexing."
Max CVSS
7.5
EPSS Score
60.06%
Published
2015-08-13
Updated
2015-08-13
A vulnerability classified as critical has been found in uTorrent. This affects an unknown part. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. It is recommended to upgrade the affected component.
Max CVSS
8.8
EPSS Score
0.25%
Published
2022-06-17
Updated
2022-06-29
A vulnerability classified as critical was found in uTorrent. This vulnerability affects unknown code of the component PRNG. The manipulation leads to weak authentication. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.
Max CVSS
8.8
EPSS Score
0.54%
Published
2022-06-17
Updated
2022-06-29
A vulnerability, which was classified as critical, has been found in uTorrent. This issue affects some unknown processing of the component Guest Account. The manipulation leads to privilege escalation. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.
Max CVSS
8.8
EPSS Score
0.27%
Published
2022-06-17
Updated
2022-06-29
The bencoding parser in BitTorrent uTorrent through 3.5.5 (build 45505) misparses nested bencoded dictionaries, which allows a remote attacker to cause a denial of service.
Max CVSS
7.5
EPSS Score
0.87%
Published
2020-03-02
Updated
2022-05-03
13 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!