CVE-2015-5474 in BitTorrent
Summary
BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol.
Reservation
07/10/2015
Disclosure
08/13/2015
Entries
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerability | CWE | Exp | Cou | CVE |
|---|---|---|---|---|---|
| 76817 | BitTorrent/uTorrent URI Protocol command injection | 77 | Unproven | Unavailable | CVE-2015-5474 |