CVE-2015-5474
13.08.2015, 14:59
BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol.
| Vendor | Product | Version |
|---|---|---|
| bittorrent | bittorrent | * |
| utorrent | utorrent | * |
𝑥
= Vulnerable software versions