Summary
Detail | |||
---|---|---|---|
Vendor | Bitcomet | First view | 2006-01-20 |
Product | Bitcomet | Last view | 2022-03-31 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:a:bitcomet:bitcomet:0.60:*:*:*:*:*:*:* | 2 |
cpe:2.3:a:bitcomet:bitcomet:*:*:*:*:*:*:*:* | 1 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2022-03-31 | CVE-2022-27050 | BitComet Service for Windows before version 1.8.6 contains an unquoted service path vulnerability which allows attackers to escalate privileges to the system level. |
7.5 | 2006-01-20 | CVE-2006-0339 | Buffer overflow in BitComet Client 0.60 allows remote attackers to execute arbitrary code, when the publisher's name link is clicked, via a long publisher URI in a torrent file. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-428 | Unquoted Search Path or Element |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
22625 | BitComet Client .torrent URI Handling Overflow |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2006-01-20 | Name: The remote Windows host has a peer-to-peer application that is affected by a ... File: bitcomet_061.nasl - Type: ACT_GATHER_INFO |