CVE-2015-5474
13.08.2015, 14:59
BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol.
Vendor | Product | Version |
---|---|---|
bittorrent | bittorrent | * |
utorrent | utorrent | * |
𝑥
= Vulnerable software versions