Torrentpier version 2.4.1 allows executing arbitrary commands on the server.
This is possible because the application is vulnerable to insecure deserialization.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Feb 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Torrentpier
Torrentpier torrentpier |
|
CPEs | cpe:2.3:a:torrentpier:torrentpier:2.4.1:*:*:*:*:*:*:* | |
Vendors & Products |
Torrentpier
Torrentpier torrentpier |

Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2024-08-27T18:42:28.186Z
Reserved: 2024-02-19T23:43:14.777Z
Link: CVE-2024-1651

Updated: 2024-08-01T18:48:20.672Z

Status : Analyzed
Published: 2024-02-20T00:15:14.847
Modified: 2025-02-12T17:26:55.357
Link: CVE-2024-1651

No data.