CVE-2015-5474
BitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol.
Learn more about our Web Application Penetration Testing UK.
Learn more about our Web Application Penetration Testing UK.