Vulnerabilities
Vulnerable Software
Utorrent:  >> Utorrent  >> 1.8.4  Security Vulnerabilities
BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol.
CVSS Score
9.3
EPSS Score
0.012
Published
2015-08-13
Untrusted search path vulnerability in uTorrent 2.0.3 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse plugin_dll.dll, userenv.dll, shfolder.dll, dnsapi.dll, dwmapi.dll, iphlpapi.dll, dhcpcsvc.dll, dhcpcsvc6.dll, or rpcrtremote.dll that is located in the same folder as a .torrent or .btsearch file.
CVSS Score
9.3
EPSS Score
0.018
Published
2010-08-26


Contact Us

Shodan ® - All rights reserved