Page 2 of 10 results (0.010 seconds)

CVSS: 7.5EPSS: 8%CPEs: 96EXPL: 1

Stack-based buffer overflow in utp.cpp in libutp, as used in Transmission before 2.74 and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted "micro transport protocol packets." Desbordamiento de búfer basado en pila en utp.cpp en libutp, tal como se utiliza en la transmisión antes de v2.74 y posiblemente otros productos, permite a atacantes remotos provocar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario a través de "paquetes de protocolo micro de transporte" elaborados para este proposito. • http://lists.opensuse.org/opensuse-updates/2013-03/msg00064.html http://www.openwall.com/lists/oss-security/2013/02/13/1 http://www.ubuntu.com/usn/USN-1747-1 https://bugzilla.redhat.com/show_bug.cgi?id=909934 https://trac.transmissionbt.com/changeset/13646 https://trac.transmissionbt.com/ticket/5002 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 2.6EPSS: 0%CPEs: 87EXPL: 2

Multiple cross-site scripting (XSS) vulnerabilities in the web client in Transmission before 2.61 allow remote attackers to inject arbitrary web script or HTML via the (1) comment, (2) created by, or (3) name field in a torrent file. Múltiples vulnerabilidades de ejecución de comandos en sitios cruzados (XSS) en el cliente web en (Transmission) anterior a v2.61 permite a atacantes remotos inyectar código web o HTML arbitrario a través de (1) un comentario, (2) el campo (created by), o (3) el campo de nombre en un fichero (torrent). Transmission BitTorrent client versions prior to 2.61 suffer from a cross site scripting vulnerability. • http://archives.neohapsis.com/archives/fulldisclosure/2012-07/0349.html http://secunia.com/advisories/50027 http://secunia.com/advisories/50769 http://www.madirish.net/541 http://www.securityfocus.com/bid/54705 http://www.ubuntu.com/usn/USN-1584-1 https://trac.transmissionbt.com/ticket/4979 https://trac.transmissionbt.com/wiki/Changes#version-2.61 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 4%CPEs: 1EXPL: 0

Multiple stack-based buffer overflows in the tr_magnetParse function in libtransmission/magnet.c in Transmission 1.91 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted magnet URL with a large number of (1) tr or (2) ws links. Múltiples desbordamientos de búfer basado en pila en la función tr_magnetParse en libtransmission/magnet.c en Transmission v1.91, permite a atacantes remotos provocar una denegación de servicio (caída) o posiblemente ejecución de código a través de una URL manipulada con un número de enlaces (1) tr o (2) ws muy grande. • http://secunia.com/advisories/39031 http://trac.transmissionbt.com/changeset/10279 http://trac.transmissionbt.com/ticket/2965 http://trac.transmissionbt.com/wiki/Changes http://www.osvdb.org/63066 http://www.securityfocus.com/bid/38814 http://www.vupen.com/english/advisories/2010/0655 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.8EPSS: 0%CPEs: 8EXPL: 0

Directory traversal vulnerability in libtransmission/metainfo.c in Transmission 1.22, 1.34, 1.75, and 1.76 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in a pathname within a .torrent file. Vulnerabilidad de salto de directorio en libtransmission/metainfo.c en Transmission v1.22, v1.34, v1.75, y v1.76 permite a atacantes remotos sobreescribir ficheros de su elección a través de .. (punto punto) en un nombre de ruta con un fichero .torrent • http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00009.html http://secunia.com/advisories/37993 http://secunia.com/advisories/38005 http://security.debian.org/pool/updates/main/t/transmission/transmission_1.22-1+lenny2.diff.gz http://trac.transmissionbt.com/changeset/9829 http://trac.transmissionbt.com/wiki/Changes#version-1.77 http://www.debian.org/security/2010/dsa-1967 http://www.mail-archive.com/debian-devel-changes%40lists.debian.org/msg264483.html http://www.open • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 0

Cross-site request forgery (CSRF) vulnerability in Transmission 1.5 before 1.53 and 1.6 before 1.61 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. Vulnerabilidad de falsificación de petición en sitios cruzados (CSRF) en Transmission v1.5 anterior a v1.53 y v1.6 anterior a v1.61, permite a los atacantes remotos secuestrar la autenticación de víctimas no especificadas a través de vectores desconocidos. • http://www.openwall.com/lists/oss-security/2009/05/21/1 http://www.transmissionbt.com/index.php • CWE-352: Cross-Site Request Forgery (CSRF) •