Summary
Detail | |||
---|---|---|---|
Vendor | Bitcomet | First view | 2006-01-20 |
Product | Bitcomet | Last view | 2022-03-31 |
Version | 0.60 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:bitcomet:bitcomet |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2022-03-31 | CVE-2022-27050 | BitComet Service for Windows before version 1.8.6 contains an unquoted service path vulnerability which allows attackers to escalate privileges to the system level. |
7.5 | 2006-01-20 | CVE-2006-0339 | Buffer overflow in BitComet Client 0.60 allows remote attackers to execute arbitrary code, when the publisher's name link is clicked, via a long publisher URI in a torrent file. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-428 | Unquoted Search Path or Element |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
22625 | BitComet Client .torrent URI Handling Overflow |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2006-01-20 | Name: The remote Windows host has a peer-to-peer application that is affected by a ... File: bitcomet_061.nasl - Type: ACT_GATHER_INFO |