Buffer overflow in BitComet Client 0.60 allows remote attackers to execute arbitrary code, when the publisher's name link is clicked, via a long publisher URI in a torrent file.
References
Configurations
History
21 Nov 2024, 00:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2006-01/0442.html - | |
References | () http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0669.html - | |
References | () http://secunia.com/advisories/18522 - Patch, Vendor Advisory | |
References | () http://securityreason.com/securityalert/357 - | |
References | () http://www.bitcomet.com/doc/changelog.htm - | |
References | () http://www.fortinet.com/FortiGuardCenter/FSA-2006-07.html - Vendor Advisory | |
References | () http://www.osvdb.org/22625 - | |
References | () http://www.securityfocus.com/archive/1/422361/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16311 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/0251 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24229 - |
Information
Published : 2006-01-21 00:03
Updated : 2024-11-21 00:06
NVD link : CVE-2006-0339
Mitre link : CVE-2006-0339
CVE.ORG link : CVE-2006-0339
JSON object : View
Products Affected
bitcomet
- bitcomet
CWE