CVE-2015-5474
EUVD-2015-542913.08.2015, 14:59
BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| bittorrent | bittorrent | * |
| utorrent | utorrent | * |
𝑥
= Vulnerable software versions