Filtered by vendor Torrentflux
Subscribe
Total
13 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2008-6585 | 1 Torrentflux | 1 Torrentflux | 2024-11-21 | 6.8 MEDIUM | N/A |
Cross-site request forgery (CSRF) vulnerability in html/admin.php in TorrentFlux 2.3 allows remote attackers to hijack the authentication of administrators for requests that add new accounts via the addUser action. | |||||
CVE-2008-6584 | 1 Torrentflux | 1 Torrentflux | 2024-11-21 | 6.0 MEDIUM | N/A |
html/index.php in TorrentFlux 2.3 allows remote authenticated users to execute arbitrary code via a URL with a file containing an executable extension in the url_upload parameter, which is downloaded by TorrentFlux and can be accessed via a direct request in a html/downloads/ user directory. | |||||
CVE-2006-6604 | 1 Torrentflux | 1 Torrentflux | 2024-11-21 | 6.5 MEDIUM | N/A |
Directory traversal vulnerability in downloaddetails.php in TorrentFlux 2.2 allows remote authenticated users to read arbitrary files via .. (dot dot) sequences in the alias parameter, a different vector than CVE-2006-6328. | |||||
CVE-2006-6600 | 1 Torrentflux | 1 Torrentflux | 2024-11-21 | 6.0 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in dir.php in TorrentFlux 2.2, when allows remote attackers to inject arbitrary web script or HTML via double URL-encoded strings in the dir parameter, a related issue to CVE-2006-5609. | |||||
CVE-2006-6599 | 1 Torrentflux | 1 Torrentflux | 2024-11-21 | 6.0 MEDIUM | N/A |
maketorrent.php in TorrentFlux 2.2 allows remote authenticated users to execute arbitrary commands via shell metacharacters (";" semicolon) in the announce parameter. | |||||
CVE-2006-6598 | 1 Torrentflux | 2 Torrentflux, Torrentflux-b4rt | 2024-11-21 | 6.5 MEDIUM | N/A |
Directory traversal vulnerability in viewnfo.php in (1) TorrentFlux before 2.2 and (2) torrentflux-b4rt before 2.1-b4rt-972 allows remote authenticated users to read arbitrary files via .. (dot dot) sequences in the path parameter, a different vector than CVE-2006-6328. | |||||
CVE-2006-6331 | 1 Torrentflux | 1 Torrentflux | 2024-11-21 | 6.0 MEDIUM | N/A |
metaInfo.php in TorrentFlux 2.2, when $cfg["enable_file_priority"] is false, allows remote attackers to execute arbitrary commands via shell metacharacters (backticks) in the torrent parameter to (1) details.php and (2) startpop.php. | |||||
CVE-2006-6330 | 1 Torrentflux | 1 Torrentflux | 2024-11-21 | 6.0 MEDIUM | N/A |
index.php for TorrentFlux 2.2 allows remote registered users to execute arbitrary commands via shell metacharacters in the kill parameter. | |||||
CVE-2006-6329 | 1 Torrentflux | 1 Torrentflux | 2024-11-21 | 4.9 MEDIUM | N/A |
index.php for TorrentFlux 2.2 allows remote attackers to delete files by specifying the target filename in the delfile parameter. | |||||
CVE-2006-6328 | 1 Torrentflux | 1 Torrentflux | 2024-11-21 | 4.9 MEDIUM | N/A |
Directory traversal vulnerability in index.php for TorrentFlux 2.2 allows remote attackers to create or overwrite arbitrary files via sequences in the alias_file parameter. | |||||
CVE-2006-5609 | 1 Torrentflux | 1 Torrentflux | 2024-11-21 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in dir.php in TorrentFlux 2.1 allows remote attackers to list arbitrary directories via "\.\./" sequences in the dir parameter. | |||||
CVE-2006-5451 | 1 Torrentflux | 1 Torrentflux | 2024-11-21 | 2.6 LOW | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in TorrentFlux 2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) action, (2) file, and (3) users array variables in (a) admin.php, which are not properly handled when the administrator views the Activity Log; and the (4) torrent parameter, as used by the displayName variable, in (b) startpop.php, different vectors than CVE-2006-5227. | |||||
CVE-2006-5227 | 1 Torrentflux | 1 Torrentflux | 2024-11-21 | 6.8 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in admin.php in TorrentFlux 2.1 allows remote attackers to inject arbitrary web script or HTML via (1) the $user_agent variable, probably obtained from the User-Agent HTTP header, and possibly (2) the $ip_resolved variable. |