5 results (0.014 seconds)

CVSS: 7.8EPSS: 1%CPEs: 5EXPL: 1

Use-after-free in libtransmission/variant.c in Transmission before 3.00 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted torrent file. Un uso de la memoria previamente liberada en el archivo libtransmission/variant.c en Transmission versiones anteriores a 3.00, permite a atacantes remotos causar una denegación de servicio (bloqueo) o posiblemente ejecutar código arbitrario por medio de un archivo torrent diseñado. • https://github.com/transmission/transmission/commit/2123adf8e5e1c2b48791f9d22fc8c747e974180e https://lists.debian.org/debian-lts-announce/2020/05/msg00022.html https://lists.debian.org/debian-lts-announce/2020/08/msg00001.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CD3GLZ5URIK74RCGLSH72IVLDIJJMLQC https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OVAG2HNKNRLWOACFN5F2ANJD2SQ53WI7 https://security.gentoo.org/glsa/202007-07 https://tomrichards. • CWE-416: Use After Free •

CVSS: 8.8EPSS: 1%CPEs: 4EXPL: 3

Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack. Transmission, hasta la versión 2.92, confía en X-Transmission-Session-Id (que no es una cabecera prohibida para Fetch) para el control de acceso, lo que permite que atacantes remotos ejecuten comandos RPC arbitrarios y escriban en archivos arbitrarios mediante peticiones POST en /transmission/rpc, en combinación con un ataque de DNS rebinding. • https://www.exploit-db.com/exploits/43665 https://bugs.chromium.org/p/project-zero/issues/detail?id=1447 https://github.com/transmission/transmission/pull/468 https://lists.debian.org/debian-lts-announce/2018/01/msg00020.html https://security.gentoo.org/glsa/201806-07 https://twitter.com/taviso/status/951526615145566208 https://www.debian.org/security/2018/dsa-4087 •

CVSS: 6.8EPSS: 3%CPEs: 105EXPL: 1

Integer overflow in the tr_bitfieldEnsureNthBitAlloced function in bitfield.c in Transmission before 2.84 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted peer message, which triggers an out-of-bounds write. Desbordamiento de enteros en la función tr_bitfieldEnsureNthBitAlloced en bitfield.c en Transmission anterior a 2.84 permite a atacantes remotos causar una denegación de servicios y posiblemente ejecutar código arbitrario a través de un mensaje de par manipulado, lo que provoca una escritura fuera de rango. • http://inertiawar.com/submission.go http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135539.html http://lists.opensuse.org/opensuse-updates/2014-08/msg00011.html http://secunia.com/advisories/59897 http://secunia.com/advisories/60108 http://secunia.com/advisories/60527 http://www.debian.org/security/2014/dsa-2988 http://www.openwall.com/lists/oss-security/2014/07/10/4 http://www.openwall.com/lists/oss-security/2014/07/11/5 http://www.osvdb.org/108 • CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 8%CPEs: 96EXPL: 1

Stack-based buffer overflow in utp.cpp in libutp, as used in Transmission before 2.74 and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted "micro transport protocol packets." Desbordamiento de búfer basado en pila en utp.cpp en libutp, tal como se utiliza en la transmisión antes de v2.74 y posiblemente otros productos, permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de "paquetes de protocolo micro de transporte" elaborados para este proposito. • http://lists.opensuse.org/opensuse-updates/2013-03/msg00064.html http://www.openwall.com/lists/oss-security/2013/02/13/1 http://www.ubuntu.com/usn/USN-1747-1 https://bugzilla.redhat.com/show_bug.cgi?id=909934 https://trac.transmissionbt.com/changeset/13646 https://trac.transmissionbt.com/ticket/5002 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 2.6EPSS: 0%CPEs: 87EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in the web client in Transmission before 2.61 allow remote attackers to inject arbitrary web script or HTML via the (1) comment, (2) created by, or (3) name field in a torrent file. Múltiples vulnerabilidades de ejecución de comandos en sitios cruzados (XSS) en el cliente web en (Transmission) anterior a v2.61 permite a atacantes remotos inyectar código web o HTML arbitrario a través de (1) un comentario, (2) el campo (created by), o (3) el campo de nombre en un fichero (torrent). Transmission BitTorrent client versions prior to 2.61 suffer from a cross site scripting vulnerability. • http://archives.neohapsis.com/archives/fulldisclosure/2012-07/0349.html http://secunia.com/advisories/50027 http://secunia.com/advisories/50769 http://www.madirish.net/541 http://www.securityfocus.com/bid/54705 http://www.ubuntu.com/usn/USN-1584-1 https://trac.transmissionbt.com/ticket/4979 https://trac.transmissionbt.com/wiki/Changes#version-2.61 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •