Use-after-free in libtransmission/variant.c allows remote code execution via crafted torrent fil
Reporter | Title | Published | Views | Family All 30 |
---|---|---|---|---|
![]() | Debian DLA-2218-1 : transmission security update | 26 May 202000:00 | – | nessus |
![]() | Amazon Linux AMI : transmission (ALAS-2020-1399) | 20 Jul 202000:00 | – | nessus |
![]() | Debian DLA-2305-1 : transmission security update | 3 Aug 202000:00 | – | nessus |
![]() | GLSA-202007-07 : Transmission: Remote code execution | 27 Jul 202000:00 | – | nessus |
![]() | Fedora 32 : transmission (2020-e67318b4b4) | 4 Jun 202000:00 | – | nessus |
![]() | Fedora 31 : transmission (2020-3ef028d53f) | 28 May 202000:00 | – | nessus |
![]() | [SECURITY] Fedora 31 Update: transmission-2.94-9.fc31 | 27 May 202003:04 | – | fedora |
![]() | [SECURITY] Fedora 32 Update: transmission-2.94-9.fc32 | 20 May 202003:22 | – | fedora |
![]() | CVE-2018-10756 | 15 May 202000:00 | – | ubuntucve |
![]() | Fedora: Security Advisory for transmission (FEDORA-2020-3ef028d53f) | 29 May 202000:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Alpine | edge-community | noarch | transmission | 3.00-r0 | UNKNOWN |
Alpine | 3.12-community | noarch | transmission | 3.00-r0 | UNKNOWN |
Alpine | 3.13-community | noarch | transmission | 3.00-r0 | UNKNOWN |
Alpine | 3.14-community | noarch | transmission | 3.00-r0 | UNKNOWN |
Alpine | 3.15-community | noarch | transmission | 3.00-r0 | UNKNOWN |
Alpine | 3.16-community | noarch | transmission | 3.00-r0 | UNKNOWN |
Alpine | 3.17-community | noarch | transmission | 3.00-r0 | UNKNOWN |
Alpine | 3.18-community | noarch | transmission | 3.00-r0 | UNKNOWN |
Alpine | 3.19-community | noarch | transmission | 3.00-r0 | UNKNOWN |
Alpine | 3.20-community | noarch | transmission | 3.00-r0 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo