Multiple cross-site scripting (XSS) vulnerabilities in TorrentFlux 2.4 allow (1) remote attackers to inject arbitrary web script or HTML by leveraging failure to encode file contents when downloading a torrent file or (2) remote authenticated users to inject arbitrary web script or HTML via vectors involving a link to torrent details.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.openwall.com/lists/oss-security/2014/09/02/3 | Issue Tracking Mailing List Third Party Advisory | 
| http://www.securitytracker.com/id/1030791 | Third Party Advisory VDB Entry | 
| https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=759574 | Exploit Issue Tracking Third Party Advisory | 
| http://www.openwall.com/lists/oss-security/2014/09/02/3 | Issue Tracking Mailing List Third Party Advisory | 
| http://www.securitytracker.com/id/1030791 | Third Party Advisory VDB Entry | 
| https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=759574 | Exploit Issue Tracking Third Party Advisory | 
Configurations
                    History
                    No history.
Information
                Published : 2018-01-16 19:29
Updated : 2024-11-21 02:13
NVD link : CVE-2014-6027
Mitre link : CVE-2014-6027
CVE.ORG link : CVE-2014-6027
JSON object : View
Products Affected
                torrentflux_project
- torrentflux
 
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
