Summary
Detail | |||
---|---|---|---|
Vendor | Transmissionbt | First view | 2012-08-15 |
Product | Transmission | Last view | 2020-05-15 |
Version | 1.41 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:transmissionbt:transmission |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2020-05-15 | CVE-2018-10756 | Use-after-free in libtransmission/variant.c in Transmission before 3.00 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted torrent file. |
5.3 | 2019-10-30 | CVE-2010-0749 | Transmission before 1.92 allows attackers to prevent download of a file by corrupted data during the endgame. |
9.8 | 2019-10-30 | CVE-2010-0748 | Transmission before 1.92 allows an attacker to cause a denial of service (crash) or possibly have other unspecified impact via a large number of tr arguments in a magnet link. |
8.8 | 2018-01-15 | CVE-2018-5702 | Transmission through 2.92 relies on X-Transmission-Session-Id (which is not a forbidden header for Fetch) for access control, which allows remote attackers to execute arbitrary RPC commands, and consequently write to arbitrary files, via POST requests to /transmission/rpc in conjunction with a DNS rebinding attack. |
6.8 | 2014-07-29 | CVE-2014-4909 | Integer overflow in the tr_bitfieldEnsureNthBitAlloced function in bitfield.c in Transmission before 2.84 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted peer message, which triggers an out-of-bounds write. |
7.5 | 2013-04-02 | CVE-2012-6129 | Stack-based buffer overflow in utp.cpp in libutp, as used in Transmission before 2.74 and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted "micro transport protocol packets." |
2.6 | 2012-08-15 | CVE-2012-4037 | Multiple cross-site scripting (XSS) vulnerabilities in the web client in Transmission before 2.61 allow remote attackers to inject arbitrary web script or HTML via the (1) comment, (2) created by, or (3) name field in a torrent file. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (2) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
16% (1) | CWE-416 | Use After Free |
16% (1) | CWE-189 | Numeric Errors |
16% (1) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
16% (1) | CWE-20 | Improper Input Validation |
OpenVAS Exploits
id | Description |
---|---|
2012-09-27 | Name : Ubuntu Update for transmission USN-1584-1 File : nvt/gb_ubuntu_USN_1584_1.nasl |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-06-20 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201806-07.nasl - Type: ACT_GATHER_INFO |
2018-02-09 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-950.nasl - Type: ACT_GATHER_INFO |
2018-01-19 | Name: The remote Debian host is missing a security update. File: debian_DLA-1246.nasl - Type: ACT_GATHER_INFO |
2018-01-18 | Name: The remote Fedora host is missing a security update. File: fedora_2018-d1e263e68e.nasl - Type: ACT_GATHER_INFO |
2018-01-15 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4087.nasl - Type: ACT_GATHER_INFO |
2015-01-23 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_0523fb7e84444e86812d8de05f6f0dce.nasl - Type: ACT_GATHER_INFO |
2015-01-19 | Name: The remote Solaris system is missing a security patch for third-party software. File: solaris11_transmission_20140522.nasl - Type: ACT_GATHER_INFO |
2014-10-12 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2014-390.nasl - Type: ACT_GATHER_INFO |
2014-08-15 | Name: The remote Fedora host is missing a security update. File: fedora_2014-8332.nasl - Type: ACT_GATHER_INFO |
2014-08-12 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2014-484.nasl - Type: ACT_GATHER_INFO |
2014-07-26 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-2988.nasl - Type: ACT_GATHER_INFO |
2014-07-21 | Name: The remote Fedora host is missing a security update. File: fedora_2014-8331.nasl - Type: ACT_GATHER_INFO |
2014-07-17 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-2279-1.nasl - Type: ACT_GATHER_INFO |
2014-06-13 | Name: The remote openSUSE host is missing a security update. File: openSUSE-2013-220.nasl - Type: ACT_GATHER_INFO |
2013-02-26 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-1747-1.nasl - Type: ACT_GATHER_INFO |
2012-09-27 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-1584-1.nasl - Type: ACT_GATHER_INFO |
2010-04-09 | Name: The remote openSUSE host is missing a security update. File: suse_11_0_transmission-100406.nasl - Type: ACT_GATHER_INFO |
2010-04-09 | Name: The remote openSUSE host is missing a security update. File: suse_11_2_transmission-100406.nasl - Type: ACT_GATHER_INFO |
2010-04-09 | Name: The remote openSUSE host is missing a security update. File: suse_11_1_transmission-100406.nasl - Type: ACT_GATHER_INFO |