Vulnerabilities > Torrentflux Project

DATE CVE VULNERABILITY TITLE RISK
2018-01-16 CVE-2014-6027 Cross-site Scripting vulnerability in Torrentflux Project Torrentflux 2.4
Multiple cross-site scripting (XSS) vulnerabilities in TorrentFlux 2.4 allow (1) remote attackers to inject arbitrary web script or HTML by leveraging failure to encode file contents when downloading a torrent file or (2) remote authenticated users to inject arbitrary web script or HTML via vectors involving a link to torrent details.
4.3
2014-09-05 CVE-2014-6029 Improper Input Validation vulnerability in Torrentflux Project Torrentflux 2.4
TorrentFlux 2.4 allows remote authenticated users to delete or modify other users' cookies via the cid parameter in an editCookies action to profile.php.
4.9
2014-09-05 CVE-2014-6028 Improper Input Validation vulnerability in Torrentflux Project Torrentflux 2.4
TorrentFlux 2.4 allows remote authenticated users to obtain other users' cookies via the cid parameter in an editCookies action to profile.php.
network
low complexity
torrentflux-project CWE-20
4.0
2008-04-30 CVE-2008-2020 Use of Insufficiently Random Values vulnerability in multiple products
The CAPTCHA implementation as used in (1) Francisco Burzi PHP-Nuke 7.0 and 8.1, (2) my123tkShop e-Commerce-Suite (aka 123tkShop) 0.9.1, (3) phpMyBitTorrent 1.2.2, (4) TorrentFlux 2.3, (5) e107 0.7.11, (6) WebZE 0.5.9, (7) Open Media Collectors Database (aka OpenDb) 1.5.0b4, and (8) Labgab 1.1 uses a code_bg.jpg background image and the PHP ImageString function in a way that produces an insufficient number of different images, which allows remote attackers to pass the CAPTCHA test via an automated attack using a table of all possible image checksums and their corresponding digit strings.
7.5