
#Btsearch file utorrent#
The Web UI interface in (1) BitTorrent before 6.0.3 build 8642 and (2) uTorrent before 1.8beta build 10524 allows remote attackers to cause a denial of service (application crash) via an HTTP request with a malformed Range header.
#Btsearch file code#
Stack-based buffer overflow in (1) uTorrent 1.7.7 build 8179 and earlier and (2) BitTorrent 6.0.3 build 8642 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long Created By field in a.
#Btsearch file download#
Published: Septem6:30:01 AM -0400Ĭross-site request forgery (CSRF) vulnerability in gui/index.php in µTorrent (uTorrent) WebUI 0.315 allows remote attackers to (1) hijack the authentication of users for requests that force the download of arbitrary torrent files via the add-url action and (2) hijack the authentication of administrators for requests that modify the administrator account via the setsetting action. NOTE: this is probably a different vulnerability than CVE-2008-0071 and CVE-2008-0364. Published: Aug2:36:35 PM -0400īuffer overflow in the web interface in BitTorrent 6.0.1 (build 7859) and earlier, and uTorrent 1.7.6 (build 7859) and earlier, allows remote attackers to cause a denial of service (memory consumption and crash) via a crafted Range header. Untrusted search path vulnerability in uTorrent 2.0.3 and earlier allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse plugin_dll.dll, userenv.dll, shfolder.dll, dnsapi.dll, dwmapi.dll, iphlpapi.dll, dhcpcsvc.dll, dhcpcsvc6.dll, or rpcrtremote.dll that is located in the same folder as a. NOTE: some of these details are obtained from third party information.

Published: Septem6:55:09 AM -0400īuffer overflow in the "create torrent dialog" functionality in uTorrent 1.8.3 build 15772, and possibly other versions before 1.8.3 (Build 16010), allows user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a text file containing a large string.
#Btsearch file for android#
The uTorrent Remote (aka ) application 0929 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. Published: Ma2:15:12 PM -0500īitTorrent and uTorrent allow remote attackers to inject command line parameters and execute arbitrary commands via a crafted URL using the (1) bittorrent or (2) magnet protocol. Sounds promising if your files really are BTrieve files that you'll still be able to read them.The bencoding parser in BitTorrent uTorrent through 3.5.5 (build 45505) misparses nested bencoded dictionaries, which allows a remote attacker to cause a denial of service. At one point, Btrieve's former CEO Ron Harris stated that "The version 1.0 API is still supported in version 6.15, and we're going to keep it forever!" (Kyle, pg 11)."


"The API likewise remained backwards compatible, with only one feature (split files to separate media) being dropped. Maybe you can google some on your own like: BTrieve DAT convertĪ quote from this site: The Architecture of BTrieve Googling turned up this website that has a tool on it called BtSearch that is able to analyze BTrieve DAT files (Caution: Commercial product!): I think it had to do with some files containing the "true" data and other files contained the indexes (*.IDX). Way back in the first half of the 1990's I had to do with a ISAM DB called BTrieve and I'm pretty sure that there were also some *.DAT files involved. One idea came to mind hearing that about some *.DAT files.
