Deluge-Torrent Deluge 1.3.4

CPE Details

Deluge-Torrent Deluge 1.3.4
1.3.4
2020-07-08
14h24 +00:00
2020-07-08
14h24 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:deluge-torrent:deluge:1.3.4:*:*:*:*:*:*:*

Informations

Vendor

deluge-torrent

Product

deluge

Version

1.3.4

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-3427 2022-08-25 22h00 +00:00 The Deluge Web-UI is vulnerable to XSS through a crafted torrent file. The the data from torrent files is not properly sanitised as it's interpreted directly as HTML. Someone who supplies the user with a malicious torrent file can execute arbitrary Javascript code in the context of the user's browser session.
6.1
Moyen
CVE-2017-9031 2017-05-17 17h00 +00:00 The WebUI component in Deluge before 1.3.15 contains a directory traversal vulnerability involving a request in which the name of the render file is not associated with any template file.
9.8
Critique
CVE-2017-7178 2017-03-18 19h10 +00:00 CSRF was discovered in the web UI in Deluge before 1.3.14. The exploitation methodology involves (1) hosting a crafted plugin that executes an arbitrary program from its __init__.py file and (2) causing the victim to download, install, and enable this plugin.
8.8
Haute